CHAPTER 1: INTRODUCTION AUTHENTICATION OPERATIONS
24 8E6 TECHNOLOGIES, R3000 ENTERPRISE FILTER AUTHENTICATION USER GUIDE

tory server, the Novell eDirectory Agent can be used instead

to authenticate end users.

NOTE: See 8e6 Authenticator and Novell eDirectory Agent for
information on setting up these types of authentication on the
network.