Contains entries to control trusted login from remote hosts.
The Wizard Tools require automatic login or authentication as root on every machine in the cluster. One method is to include the names of trusted hosts in the .rhosts file, which must be modified appropriately on each node. See the rhosts manual page for a complete description of the format.
Example
If the cluster consists of hosts shasta1 and shasta2, then every machine's .rhosts file should contain the following lines:
shasta1 root shasta2 root
Note
The Cluster Foundation (CF) provides the equivalent of .rhosts functionality (CF shell, CFCP). Therefore, if cfsh and cfcp of the Cluster Foundation are configured, all RMS configuration, administration, and operation tasks can be performed without .rhosts configuration.