Configuring a secure cluster node by node

For environments that do not support passwordless ssh or passwordless rsh, you cannot use the -security option to enable secure mode for your cluster. Instead, you can use the -securityonenode option to configure a secure cluster node by node. Moreover, to enable security in fips mode, use the -fips option together with -securityonenode.

Table: Configuring a secure cluster node by node lists the tasks that you must perform to configure a secure cluster.

Table: Configuring a secure cluster node by node

Task

Reference

Configure security on one node

See Configuring the first node.

Configure security on the remaining nodes

See Configuring the remaining nodes.

Complete the manual configuration steps

See Completing the secure cluster configuration.