This chapter discusses configuring security in a clustered environment.
For information about auditing, see “Adding auditing”.