System settings
In an IBM Security Verify Access appliance cluster, the nodes share some system settings.
- Cluster configuration
- The cluster configuration information is replicated across the nodes of the cluster.
- Runtime tuning parameters
- The advanced tuning parameters are replicated across the nodes of the cluster.
- Runtime settings
- By default, the policy server configuration and policy database is not replicated across the cluster. However, we can choose to replicate this data. For more information about this configuration, see the "Replicate settings across the cluster" details in Manage cluster configuration.
- SSL certificates
- By default, the key file used by external clients to communicate with the DSC is not automatically distributed to nodes in the cluster. However, we can choose to replicate this data by selecting the 'Replicate with Cluster' check box on the SSL certificates management page.
Parent topic: Data replication in a cluster