Managing Secure Clusters
Provides procedures that will enable you to use Data Fabric clusters securely.
Administrative topics such as configuring cross-cluster security, managing mirror volumes in secure clusters, running commands on remote secure clusters are discussed. In addition, access scenarios for secure and non-secure Data Fabric clusters and HDFS clusters are described.