Because this is configured for individual clusters, not globally, different cluster pairs can use different systems of authentication. You use a different eauth program for each different authentication mechanism.
Contact Platform Professional Services for more information about the eauth programs that Platform distributes to allow LSF to work with different security mechanisms. If you already have an eauth that works with LSF for daemon authentication within the cluster, use a copy of it.
If different clusters use different methods of authentication, set up multiple eauth programs.
In this example, Cluster1 and Cluster2 use Kerberos authentication with each other, but not with Cluster3. It does not matter how Cluster3 is configured, because without a common authentication method between clusters no communication occurs.
RECV_FROM set to Y indicates the local cluster accepts parallel jobs that originate in a remote cluster.
EQUIV set to Y changes the default behavior of LSF commands and utilities and causes them to automatically return load (lsload(1)), host (lshosts(1)), or placement (lsplace(1)) information about the remote cluster as well as the local cluster, even when you don’t specify a cluster name.
Begin RemoteClustersCLUSTERNAME EQUIV CACHE_INTERVAL RECV_FROM AUTHcluster2 Y 60 Y KRBcluster3 N 30 N -End RemoteClusters
LSF_SERVERDIR in Cluster1 includes an eauth executable named eauth.KRB.
Begin RemoteClustersCLUSTERNAME EQUIV CACHE_INTERVAL RECV_FROM AUTHcluster1 Y 60 Y KRBcluster3 N 30 N -End RemoteClusters
LSF_SERVERDIR in Cluster2 includes an eauth executable named eauth.KRB.