Background
...
For secure by default, IBM i systems are shipped to not allow adding of systems to a cluster. This setting must be changed on all nodes so that a system can be a part of a cluster. There are two options for allowing nodes to be added to a cluster:
Recommended: Allowing any system to add this node as a node in a cluster, only if the request is authenticated.
Expand | ||
---|---|---|
| ||
This option uses X.509 digital certificates to verify cluster nodes are trusted before allowing them to be added into the cluster. This requires the following software products are installed on the systems:
|
...