The installer uses passwordless secure shell (ssh) or remote shell (rsh) communications among systems. The installer uses the ssh or rsh daemon that comes bundled with the operating system. During an installation, you choose the communication method that you want to use. You then provide the installer with the superuser passwords for the systems where you plan to install. The ssh or rsh communication among the systems is removed when the installation process completes, unless the installation abruptly terminates. If installation terminated abruptly, use the installation script's -comcleanup option to remove the ssh or rsh configuration from the systems.
See Installation script options.
In most installation, configuration, upgrade (where necessary), and uninstallation scenarios, the installer can configure ssh or rsh on the target systems. In the following scenarios, you need to set up ssh or rsh manually:
When you add new nodes to an existing cluster.
When the nodes are in a subcluster during a phased upgrade.
When you perform installer sessions using a response file.
See About configuring secure shell or remote shell communication modes before installing products.