C
ONTENTS
viii
M86 S
ECURITY
U
SER
G
UIDE
Tier 2, Tier 3: Web-based authentication ...................................... 183
Tier 1: Single Sign-On Authentication .................................. 184
Net use based authentication process .......................................... 184
Re-authentication process ...................................................... 185
Tier 1 authentication method ......................................................... 186
Name resolution methods ............................................................. 186
Configuring the authentication server ........................................... 187
Login scripts ........................................................................... 187
Enter net use syntax in the login script ............................. 187
View login script on the server console .................................. 188
Block page authentication login scripts ............................. 188
LDAP server setup rules ............................................................... 189
Tier 2: Time-based, Web Authentication ............................... 190
Tier 2 implementation in an environment ...................................... 191
Tier 2 Script . ........................................................................... 192
Tier 1 and Tier 2 Script . .......................................................... 193
Tier 3: Session-based, Web Authentication ......................... 195
M86 Authenticator ................................................................... 196
Environment requirements ............................................................ 197
Windows minimum system requirements ............................... 197
Recommended system requirements ............................... 197
Macintosh minimum system requirements ............................. 198
Workstation requirements ............................................................. 198
Work flow in environments ............................................................ 199
Windows environment ............................................................ 199
Macintosh environment . ......................................................... 200
M86 Authenticator configuration priority . ................................ 201
Windows............................................................................ 201
Macintosh ......................................................................... 202
M86 Authenticator configuration syntax . ................................ 203
Sample command line parameters ................................... 203
Sample configuration file ............................................ 203
Sample configuration update packet ‘PCFG’.............. 204
Table of parameters . .............................................................. 205
Novell eDirectory Agent ......................................................... 208
Environment requirements ............................................................ 208