The installer uses passwordless secure shell or remote shell communications among systems.
The secure shell is ssh and the remote shell is rsh. Note that on HP-UX the remote shell is remsh.
The installer uses the secure shell or remote shell daemon that comes bundled with the operating system. During an installation, you choose the communication method that you want to use. You then provide the installer with the superuser passwords for the systems where you plan to install. The secure shell or remote shell communication among the systems is removed when the installation process completes, unless the installation abruptly terminates. If installation terminated abruptly, use the installation script's -comcleanup option to remove the secure shell or remote shell configuration from the systems.
In most installation, configuration, upgrade (where necessary), and uninstallation scenarios, the installer can configure secure shell or remote shell on the target systems. In the following scenarios, you need to set up secure shell or remote shell manually:
When you add new nodes to an existing cluster.
When the nodes are in a subcluster during a phased upgrade.
When you perform installer sessions using a response file.