blob: 29e2224e34d84fd79b6ce621db88c8a9a116e1d3 [file] [log] [blame]
type=page
status=published
title=Administering Security in Cluster Mode
next=administrative-security.html
prev=message-security.html
~~~~~~
= Administering Security in Cluster Mode
[[GSSCG00038]][[gknpf]]
[[administering-security-in-cluster-mode]]
== 4 Administering Security in Cluster Mode
This chapter describes important information about administering
security in a cluster.
The following topics are described:
* link:#gksam[Configuring Certificates in Cluster Mode]
* link:#gkmhh[Dynamic Reconfiguration]
* link:#gktgi[Understanding Synchronization]
This chapter assumes that you are familiar with security features such
as authentication, authorization, and certificates. If you are not, see
link:system-security.html#ablnk[Administering System Security].
Instructions for accomplishing the tasks specific to {productName} by
using the Administration Console are contained in the Administration
Console online help.
[[gksam]][[GSSCG00159]][[configuring-certificates-in-cluster-mode]]
=== Configuring Certificates in Cluster Mode
The sections link:system-security.html#abloj[Certificates and SSL] and
link:system-security.html#ablqz[Administering JSSE Certificates] describe
the relevant concepts and use of certificates in {productName}.
By default, {productName} uses self-signed certificates. The
self-signed certificates that {productName} uses might not be trusted
by clients by default because a certificate authority does not vouch for
the authenticity of the certificate.
You can instead use your own certificates, as described in
link:administrative-security.html#gkped[Using Your Own Certificates].
[[gkmhh]][[GSSCG00160]][[dynamic-reconfiguration]]
=== Dynamic Reconfiguration
Administrative commands that you execute on the domain administration
server (DAS) must either be replicated on the affected server instances,
or on all server instances that are part of the cluster. {productName} replicates the commands by sending the same administration
command request that was sent to the DAS to the server instances. As a
result of replicating the commands on the DAS and the individual
instances, the DAS and the instances make the same changes to their
respective copies of the domain's configuration.
[NOTE]
====
Oracle recommends that you enable secure admin as described in
link:administrative-security.html#gknqh[Managing Administrative Security]
so that {productName} securely transfers these files on the network.
====
Dynamic reconfiguration refers to using the `--target` operand to CLI
subcommands to make a change to a server instance (if the user-specified
target is a server instance), or all server instances that are part of
the cluster (if the user-specified target is a cluster). For
example:`asadmin create-jdbc-resource some-options --target some-target`.
The `--target` operand allows the following values:
* `server` - Performs the command on the default server instance.
This is the default value.
* configuration_name - Performs the command in the specified configuration.
* cluster_name - Performs the command on all server instances in the
specified cluster.
* instance_name - Performs the command on a specified server instance.
If a command fails for a cluster, the status shows all server instances
where dynamic reconfiguration failed, and suggests corrective next steps.
The command status also shows when a restart is required for each server instance.
The `--target` operand is supported for the following security-related CLI subcommands:
* create-jacc-provider
* delete-jacc-provider
* list-jacc-providers
* create-audit-module
* create-auth-realm
* create-file-user
* delete-audit-module
* delete-auth-realm
* delete-file-user
* update-file-user
* create-message-security-provider
* delete-message-security-provider
* list-audit-modules
* list-file-groups
* list-file-users
* login
[[gkned]][[GSSCG00226]][[enabling-dynamic-configuration]]
==== Enabling Dynamic Configuration
Dynamic configuration is enabled by default and no additional action is required.
Use the following command to enable dynamic configuration from the command line:
`asadmin --user user --passwordfile password-file set cluster-name-config.dynamic-reconfiguration-enabled=true`.
To enable dynamic configuration from the Administration Console, perform
the following steps:
1. Expand the Configurations node.
2. Click the name of the cluster's configuration.
3. On the Configuration System Properties page,
check the Dynamic Reconfiguration Enabled box.
4. Click Save.
[NOTE]
====
The dynamic reconfiguration feature applies only to server instances,
not the DAS. Therefore, you cannot "disable" dynamic reconfiguration on
the DAS. There is no way to make changes to the DAS configuration using
`asadmin` commands, the Administration Console, or the REST interface
without having those changes take effect immediately.
====
[[gktgi]][[GSSCG00161]][[understanding-synchronization]]
=== Understanding Synchronization
As described in "link:ha-administration-guide/instances.html#GSHAG00189[
Resynchronizing {productName} Instances and the DAS]"
in {productName} High
Availability Administration Guide, configuration data for a {productName} instance is stored in the repository of the DAS and in a cache on
the host that is local to the instance. The configuration data in these
locations must be synchronized. The cache is synchronized only when a
user uses the administration tools to start or restart an instance.
See "link:ha-administration-guide/instances.html#GSHAG00189[
Resynchronizing {productName} Instances and the DAS]"
in {productName} High Availability
Administration Guide for information about default synchronization for
files and directories, for the steps required to resynchronize an
instance and the DAS, and for additional synchronization topics.