Considerations when enabling security in a network deployment
environment
This section contains information that you need to know
when enabling security in a network deployment environment.
This section contains the following topics:
Running the syncNode command after enabling security
In a network deployment topology, if security is not enabled
during profile creation and you decide later to enable it, you must
run the syncNode command on each federated node to synchronize the
nodes in the administrative console. If security was enabled during
profile creation, these steps are unnecessary.
Enabling security for RMI and SOAP connections
If you are using a Remote Method Invocation (RMI) connector
or a SOAP connector for communicating between servers in a cluster,
you must manually adjust the configuration properties.