Platform LSF programming is distributed programming. Since LSF services are provided network-wide, it is important to deliver the service without compromising the system security.
LSF supports several user authentication protocols. Support for these protocols are described in Administering IBM Platform LSF. Your LSF administrator can configure the cluster to use any of the supported protocols.
Only those LSF API function calls that operate on user jobs, user data, or LSF servers require authentication. Function calls that return information about the system do not need to be authenticated.
The most commonly used authentication protocol, the privileged port protocol, requires that load sharing applications be installed as setuid programs. This means that your application has to be owned by root with the setuid bit set.
If you need to frequently change and re-link your applications with LSF API, you can consider using the ident protocol which does not require applications to be setuid programs.