CHAPTER 1: INTRODUCTION AUTHENTICATION OPERATIONS

tory server, the Novell eDirectory Agent can be used instead to authenticate end users.

NOTE: See 8e6 Authenticator and Novell eDirectory Agent for information on setting up these types of authentication on the network.

24

8E6 TECHNOLOGIES, R3000 ENTERPRISE FILTER AUTHENTICATION USER GUIDE

Page 36
Image 36
8e6 Technologies R3000 manual Introduction Authentication Operations