HP Application Recovery Manager software A.06.10 Installation and licensing guide (March 2008)
these capabilities are available only to the processes running on cell authorities (Cell
Manager and Installation Server), and that all other requests are rejected.
Before securing clients, it is important to determine a list of trusted hosts. This list must
include:
• Cell Manager
• Relevant Installation Servers
• For some clients also a list of clients that will access the m remotely.
IMPORTANT:
The list must contain all possible hostnames (or IP addresses) where connections can
come from. Multiple hostnames may be needed if any of the above clients is multihomed
(has multiple network adapters and/or multiple IP addresses) or is a cluster.
If the DNS configuration in the cell is not uniform, additional considerations may apply.
For more information, refer to “Securing clients” on page 101.
While it may not always be necessary to secure each and every client in the cell, it
is important that the computers that other clients will trust are secured themselves:
• Cell Manager
• Installation Servers
NOTE:
User interface clients do not need to be added to the list of trusted clients. Depending on
the user rights, you can either use the GUI to access the complete Application Recovery
Manager functionality or to access only specific contexts.
Application Recovery Manager users
Consider the following important aspects when configuring Application Recovery
Manager users:
• Some user rights are very powerful. For example, the User configuration
and Clients configuration user rights enable the user to change the security
settings. user right is also very powerful, especially if (but not only if) combined
with either the or user rights.
• Even less powerful user rights bear an inherent risk associated with them.
Application Recovery Manager can be configured to restrict certain user rights
Installation and licensing guide 99