Security Settings

In an IBM Security Verify Access appliance cluster, the nodes share configuration data and runtime data that is related to the security settings.

Configuration data
  • One-time password (OTP) mapping rules.
  • Policy information such as risk profiles, attributes, and obligations.
  • Configuration information such as user registry data.
  • All of the advanced configuration data.
Geolocation data
  • Data that maps ranges of IP addresses to geographic locations.
Runtime data
  • Session data.
  • Non-session data that is relevant to the cluster, such as one-time passwords.
  • Template files.

Parent topic: Data replication in a cluster