Copyright
LSF security considerations
Communications between daemons and commands
Transmission of LSF commands for remote execution
Access to jobs belonging to other users
Accessing remote hosts
False requests
Authentication
Kerberos integration
Secure your LSF cluster
Secure communications between daemons and commands
Encrypt transmission of LSF commands for remote execution and login
Restrict user access to remote hosts
Secure your cluster against false requests
Customize external authentication
Enable external authentication of LSF daemons
Secure the cluster from root access for batch interactive jobs in pseudoterminals
Restrict user access to administration commands and log files