To: Lynn who wrote (20511 ) 10/1/1999 5:00:00 PM From: Mephisto Read Replies (1) | Respond to of 64865
Couldn't get a picture of Sun Ray. YET. But here's how the smart card works: "The Sun RayTM 1 enterprise appliance supports smart card technology to give users a high degree of mobility wihin the workgroup. Users' desktop environments are now accessible from anywhere within the Sun Ray enterprise system. Users can simply move to another desktop appliance within the same workgroup, insert their smart card, and return to their desktop computing environment exactly as they left it, reducing downtime and increasing productivity. The Sun Ray 1 enterprise appliance includes a built-in smart card reader that conforms to the ISO-7816 standard. The size of an ID badge or credit card, smart cards can provide easy and instantidentification of users. he product. Here is a typical login scenario using smart card authentication at the Sun Ray 1 enterprise appliance: 1.A user inserts a smart card into the card reader on the Sun Ray 1 desktop appliance. 2.The Sun Ray 1 enterprise appliance reads the serial Number of the card and sends it to the Authentication Manager running on the Sun Ray enterprise server. 3.The Authentication Manager exchanges messages with the Sun Ray 1 enterprise appliance to complete authentication. If authentication succeeds, the Authentication Manager maps the user to a session ID and either creates a new session or locates the user's currently active session. 4.Once the currently active session has been identified, the Session Manager directs all of the associated services to the Sun Ray 1 enterprise appliance upon which the user is currently authenticated. 5.When the user is finished (that is, the smart card is removed), the Authentication Manager is notified. If the user has not logged out, the session is kept alive with all services disconnected from the display. No files are left on the device, as all state is kept on the server, and the screen is cleared. When the user removes the smart card, there are no traces that he or she had been there. There is no risk that the next user to walk up will discover files or see the contents of windows that he or she shouldn't see." [(LYNN, thank about it. You could be on a boat in the Indian Ocean and still stay in touch with the outside world) Mephisto ]