I have moved your post to the other EMC Software forum in order to ensure you get better visibility on it. I have no product expertise in this area about your question but a quick search yielded this white paper that might assist you.
The WP is about MV with cluster enabler, which isn't what i am looking for. Basically my question is, is there a way to give restricted access to specific luns to be sync'd, fractured etc. from the unix host without compromising security? I know Celerra 5.6 code has a replication role to allow certain users manage their system's respective luns, mirrors themselves but i don't think this is available with the cx3-80, running flare 3.26. I guess we'd just have to set up a user on the 2 arrays and set up security file on the 2 hosts in question. Root would be required to run these commands, but that still means system admins have full access to run any commands from the boxes.
Mabro1
2 Intern
•
666 Posts
0
October 13th, 2009 02:00
I have moved your post to the other EMC Software forum in order to ensure you get better visibility on it. I have no product expertise in this area about your question but a quick search yielded this white paper that might assist you.
http://korea.emc.com/collateral/hardware/white-papers/h5588-emc-mirrorview-cluster-enabler-wp.pdf
I hope this helps.
Regards,
Mark Browne
EMC Support Forums Administrator
vkinva
18 Posts
0
October 13th, 2009 08:00
The WP is about MV with cluster enabler, which isn't what i am looking for. Basically my question is, is there a way to give restricted access to specific luns to be sync'd, fractured etc. from the unix host without compromising security? I know Celerra 5.6 code has a replication role to allow certain users manage their system's respective luns, mirrors themselves but i don't think this is available with the cx3-80, running flare 3.26. I guess we'd just have to set up a user on the 2 arrays and set up security file on the 2 hosts in question. Root would be required to run these commands, but that still means system admins have full access to run any commands from the boxes.
Thanks,
Vk