CHAPTER 1: INTRODUCTION AUTHENTICATION OPERATIONS

+If UT[0] is set, then the Novell environment will be ignored, if present, and only the Windows environment information will be retrieved and sent to the R3000. If UT[1] is set and the Novell environment is invalid or the user is not authenticated with its Novell server, then the results sent to the R3000 are invalid (probably empty values). The default UT[255] auto detects Novell vs. Win32 and will automatically favor Novell authentication over Windows, if possible.

*Special Interest. Values most likely to change during testing, configuration, and production implementation.

++Alternate configuration file is only valid when specified on the command line. It will be ignored in any other context. If the configuration file cannot be loaded from the alter- nate location, an error will be logged and an attempt will be made to load the default configuration file. If the alter- nate configuration file is specified and is blank ( CF[] ), the 8e6 Authenticator will not attempt to load any config- uration file; this can minimally speed up execution time. The compiled default value of CF[-] causes the default configuration file loading to be attempted, which has the same full path and filename of the current, loaded 8e6 Authenticator executable, but with an extension of “.cfg” instead of “.exe”. That is, if the 8e6 Authenticator client is “\\example\authenticat.exe”, the search for the default configuration file would be “\\example\authenticat.cfg”. It is not an error if the default configuration file does not exist. It is an error if the default configuration file exists but cannot be read or parsed correctly. Unknown param- eters are ignored. Format/syntax errors will abort the reading and report an error, but the 8e6 Authenticator will attempt to continue running.

For each IP address where “:PORT” is omitted from the address, the RP[] port value is used. For example, if RA[1.1.1.1:5555] is set, the RP[] parameter is ignored.

48

8E6 TECHNOLOGIES, R3000 ENTERPRISE FILTER AUTHENTICATION USER GUIDE

Page 60
Image 60
8e6 Technologies R3000 manual Introduction Authentication Operations