ctsec.cfg File
Purpose
Provides configuration information about the authentication methods that cluster security services can use for client or server authentication.
Description
The ctsec.cfg configuration file provides configuration information about
the authentication methods that cluster security services can use
for client-server authentication. Each authentication method is
handled by a mechanism pluggable module (MPM). Each MPM configuration
is defined by a one-line entry in the ctsec.cfg file. The entry contains information about:
- The priority of the MPM when cluster security services choose the authentication method for the client-server authentication
- The numeric code of the MPM, which is unique among all of the MPMs in the configuration file
- The mnemonic of the MPM, which is unique among all of the MPMs in the configuration file
- The name of the binary module that implements the function of the MPM
- Miscellaneous flags used by cluster security services mechanism abstract layer (MAL) when handling the MPM
Files
- /var/ct/cfg/ctsec.cfg
- Working copy of the MAL configuration file
- /var/ct/cfg/ctsec.cfg.bak
- Backup of the working copy of the MAL configuration file
Implementation specifics
This file is part of the Reliable Scalable Cluster Technology (RSCT) cluster security services. It is shipped as part of the rsct.core.sec fileset for AIX®.
Location
- /opt/rsct/cfg/ctsec.cfg