SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : How high will Microsoft fly? -- Ignore unavailable to you. Want to Upgrade?


To: d[-_-]b who wrote (11390)10/19/1998 12:06:00 AM
From: ToySoldier  Read Replies (1) | Respond to of 74651
 
Sorry Eric, I thought I could provide you an answer in more general industry terms - guess I couldnt.

By "Unix user security systems" I meant the ACL administration that Unix administrators use to control user access to Unix hosts. For example, when I telnet into one of our company's several Unix boxes I use Telnet to access one of my SMTP mail services and other basic services on this host. When I use telnet and connect to the host I get a login prompt. (A login prompt is when a system asks you to identify yourself prior to the host allowing you access to its system - usually a username and password). The login information I enter is compared against an ACL (Access Control List) which the Unix Administrator manages.

Yes I can get you examples but when I get back to work - if you are really interested. Dont waste my time if your not.

The Telnet app should be able to verify to the Unix host where it is being run from and who is logged into the computer that Telnet is being executed from. In that way, the Telnet app and the Unix host can together come to the conclusion (based on NDS authentication information) that the user has is authorized to access the host.

Again Eric sorry for being vague with you - by 3270 I meant either the TN3270 or native 3270 emulator software (like attachmate or PComm). Technically its a software program that can communicate the SNA LU2 or even LU6.2 protocol to a mainframe VTAM SNA device of some kind (be it a gateway, controller, router, or FEP). If you need more information on what is commonly referred to as 3270 communication, I can find some white papers on that as well.

Toy



To: d[-_-]b who wrote (11390)10/19/1998 12:46:00 PM
From: ToySoldier  Respond to of 74651
 
Eric,

You are right that its not easy to locate the specific information on examples of Novell customers that have implemented Unix solutions, but here is a long "white paper" story on a customer that has integrated NDS over their entire enterprise. Clemson University...

novell.com

Another Novell customer that is working on a Single-Logon goal for its various platforms is National Bank of Canada. There is no documented example within the Novell site regarding this customer or its progress.

As for MSFT Active Directory limitations...

Following is a technical explanation of why Active Directory will be no serious competitor to NDS (or other true DS products) and why future MSFT customers will realize the serious limitations of MAD...

(warning! this site is highly technical so if you are not technically inclined or not interested in the technical reasons why MAD will be limited - then don't enter the following web sites)

Working Limitations to Active Directory
novell.com

Integrating Active Directory (why use Active Directory and when? answered on this page)
novell.com

Cheers!

Toy