System settings

In an IBM Security Verify Access appliance cluster, the nodes share some system settings.

Cluster configuration
The cluster configuration information is replicated across the nodes of the cluster.
Runtime tuning parameters
The advanced tuning parameters are replicated across the nodes of the cluster.
Runtime settings
By default, the policy server configuration and policy database is not replicated across the cluster. However, we can choose to replicate this data. For more information about this configuration, see the "Replicate settings across the cluster" details in Manage cluster configuration.
SSL certificates
By default, the key file used by external clients to communicate with the DSC is not automatically distributed to nodes in the cluster. However, we can choose to replicate this data by selecting the 'Replicate with Cluster' check box on the SSL certificates management page.

Parent topic: Data replication in a cluster