• Copyright
  • Platform LSF security considerations
    • Communications between daemons and commands
    • Transmission of Platform LSF commands for remote execution
    • Access to jobs belonging to other users
    • Accessing remote hosts
    • False requests
    • Authentication
    • Kerberos integration
  • Secure your Platform LSF cluster
    • Secure communications between daemons and commands
    • Encrypt transmission of Platform LSF commands for remote execution and login
    • Restrict user access to remote hosts
    • Secure your cluster against false requests
    • Customize external authentication
    • Enable external authentication of Platform LSF daemons
    • Secure the cluster from root access for batch interactive jobs in pseudoterminals
    • Restrict user access to administration commands and log files