You want to create a role that contains only the authorizations Solaris.cluster.modify and
Solaris.cluster.admin. As you then decide which users should be able to successfully access every
cluster command, you can just assign these users to the role and give them the role password.
These users will never need to have the root password, but they will be able to execute every
cluster command.
Which two statements are true? (Choose two.)
A.
This scheme will work for both cluster commands and Sun Cluster Manager.
B.
There are still some cluster-related activities, such as modifying the /etc/vfstab file, that the user
might NOT be able to do.
C.
The users who switch to the role will still NOT have Solaris.cluster.read authorization, so they
will not be able to view cluster status and configuration.
D.
This scheme will work as the users try to access command line commands, but it will NOT work
if the users execute operations through Sun Cluster Manager.