RE: Testing a fence program

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Title: RE: Testing a fence program

It’s not really the ssh solution via keys that’s the problem, it’s allowing root to login via ssh that the problem.  That is strictly prohibited.  Xm destroying a host requires root access.  We cannot su  to xm destroy after we login as a non root user for obvious reasons.  Sudo is right out of the question in our environment.  I’m not even going to try to mix up GRSecurity RBAC policies and sudo policies, etc

 

 

 


From: linux-cluster-bounces@xxxxxxxxxx [mailto:linux-cluster-bounces@xxxxxxxxxx] On Behalf Of Patton, Matthew F, CTR, OSD-PA&E
Sent: Tuesday, August 22, 2006 1:52 PM
To: 'linux clustering'
Subject: RE: Testing a fence program

 

Classification: UNCLASSIFIED

John Anderson wrote:

> Since my security department frowns strongly on authentication by ssh
> key

Can you elaborate on what their problems are? Is the security department staffed by the clueless?
Because the whole SOAP solution while downright creative, is so unnecessary.

--
Linux-cluster mailing list
Linux-cluster@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/linux-cluster

[Index of Archives]     [Corosync Cluster Engine]     [GFS]     [Linux Virtualization]     [Centos Virtualization]     [Centos]     [Linux RAID]     [Fedora Users]     [Fedora SELinux]     [Big List of Linux Books]     [Yosemite Camping]

  Powered by Linux