In an deployment manager cell there are additional security considerations to those for setting up the core security support.
Why and when to perform this task
The most important consideration is the user registry, becausee the
user must have access to all machines in the network.
Steps for this task
- If the operating system is the user registry:
- The user registry must be a domain or network user registry.
- All usernames should be valid domain or network users.
- A Windows domain user registry works with a deployment manager cell.
- In a UNIX or mixed UNIX and Windows environment, it
is preferable to use the Lightweight Directory Access Protocol (LDAP) as the
user registry.