Platform LSF Administration Guide Version 6.2
Administering Platform LSF
565
C HAPTER
40
Authentication
Controlling access to remote execution has two requirements:
◆
Authenticate the user.
When a user executes a remote command, the command must be run with that
user’s permission. The LSF daemons need to know which user is requesting the
remote execution.
◆
Check access controls on the remote host.
The user must be authorized to execute commands remotely on the host.
This chapter describes user, host, and daemon authentication in LSF.
Contents
◆
“About User Authentication” on page 566
◆
“About Host Authentication” on page 571
◆
“About Daemon Authentication” on page 572
◆
“LSF in Multiple Authentication Environments” on page 573
◆
“User Account Mapping” on page 574