25.06.2015 Views

Administering Platform LSF - SAS

Administering Platform LSF - SAS

Administering Platform LSF - SAS

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

C H A P T E R<br />

38<br />

Authentication<br />

Controlling access to remote execution has two requirements:<br />

◆ Authenticate the user.<br />

When a user executes a remote command, the command must be run with<br />

that user’s permission. The <strong>LSF</strong> daemons need to know which user is<br />

requesting the remote execution.<br />

◆ Check access controls on the remote host.<br />

The user must be authorized to execute commands remotely on the host.<br />

This chapter describes user, host, and daemon authentication in <strong>LSF</strong>.<br />

Contents ◆ “About User Authentication” on page 494<br />

◆ “About Host Authentication” on page 500<br />

◆ “About Daemon Authentication” on page 501<br />

◆ “<strong>LSF</strong> in Multiple Authentication Environments” on page 502<br />

◆ “User Account Mapping” on page 503<br />

<strong>Administering</strong> <strong>Platform</strong> <strong>LSF</strong> 493

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!