Chapter 3: Using Security with a Clustered Environment

This chapter discusses configuring security in a clustered environment.

For information about auditing, see “Adding auditing”.