Security Settings
In an IBM Security Verify Access appliance cluster, the nodes share configuration data and runtime data that is related to the security settings.
- Configuration data
- One-time password (OTP) mapping rules.
- Policy information such as risk profiles, attributes, and obligations.
- Configuration information such as user registry data.
- All of the advanced configuration data.
- Geolocation data
- Data that maps ranges of IP addresses to geographic locations.
- Runtime data
- Session data.
- Non-session data that is relevant to the cluster, such as one-time passwords.
- Template files.
Parent topic: Data replication in a cluster