ctsec.cfg File

Purpose

Provides configuration information about the authentication methods that cluster security services can use for client or server authentication.

Description

The ctsec.cfg configuration file provides configuration information about the authentication methods that cluster security services can use for client-server authentication. Each authentication method is handled by a mechanism pluggable module (MPM). Each MPM configuration is defined by a one-line entry in the ctsec.cfg file. The entry contains information about:
  • The priority of the MPM when cluster security services choose the authentication method for the client-server authentication
  • The numeric code of the MPM, which is unique among all of the MPMs in the configuration file
  • The mnemonic of the MPM, which is unique among all of the MPMs in the configuration file
  • The name of the binary module that implements the function of the MPM
  • Miscellaneous flags used by cluster security services mechanism abstract layer (MAL) when handling the MPM
Cluster security services include a default ctsec.cfg file in the /opt/rsct/cfg/ directory. Use the ctscfg command to modify a working copy of this configuration file. ctscfg does not modify the default configuration file in /opt/rsct/cfg/. Instead, ctscfg makes a copy (if one does not exist already) of the default ctsec.cfg file and copies it to the /var/ct/cfg/ directory. If a working copy of this file does exist already and there is enough space, the previous version is recorded to /var/ct/cfg/ctsec.cfg.bak.

Files

/var/ct/cfg/ctsec.cfg
Working copy of the MAL configuration file
/var/ct/cfg/ctsec.cfg.bak
Backup of the working copy of the MAL configuration file

Implementation specifics

This file is part of the Reliable Scalable Cluster Technology (RSCT) cluster security services. It is shipped as part of the rsct.core.sec fileset for AIX®.

Location

/opt/rsct/cfg/ctsec.cfg