A replication cluster uses cluster authentication credentials for identification and authentication. To improve system security, you can periodically configure the cluster authentication credentials for a replication cluster.
The Configure Cluster Service Credential page is displayed.
After the cluster authentication credentials are modified on the remote device, you need to synchronize the modifications to the local device.
For example, if you add remote device B, on which you have performed the operations in Configure Cluster Service Credential, to storage system A, you need to synchronize the cluster service credentials of storage system B to storage system A. For details, see Modifying a Remote Device. However, if you have configured the cluster service credentials on storage system A, you do not need to synchronize the cluster service credentials of storage system A to storage system B.