HP OpenVMS Guide to System Security: OpenVMS Version 8.4 > Chapter 12 Securing a Cluster
Clustered systems provide a uniform computing environment that is highly scalable, highly available, and secure. It is critical that there be a single set of authorized users and that these users be able to have processes executing on any cluster member.
Within a cluster, authorization data for users and the security profiles of objects must be consistent across all nodes so that each cluster member makes the same access control decision when presented with a particular user's access request for a particular object. “Building a Common Environment” and “Synchronizing Authorization Data” describe how to achieve a single security domain.