Virtual Business Services security model example

Consider two virtual business services:

Figure: Virtual Business Services security model

Virtual Business Services security model

Assume the following service groups for each cluster:

When you create a virtual business service from the Veritas InfoScale Operations Manager interface, Veritas InfoScale Operations Manager deploys a per-cluster credential (digital certificate) to each cluster. All hosts on the cluster get a credential that identifies them as belonging to that cluster. The cluster credential contains the cluster ID. Likewise, hosts on another cluster also get credentials that identify them as belonging to their respective cluster.

Additionally, the credential also has information about the Management Server that sent the credential. This information is required when one host is managed by multiple Management Servers.