
Managing Objects
97
no
vd
ocx (
E
NU)
01
F
ebr
ua
ry
200
6
3.2.2 Setting Up Optional Account Features
After creating a User object, you can set up the user’s network computing environment and
implement extra login security features.
Setting Up a User's Network Computing Environment
1
In Novell iManager, click the
Roles and Tasks
button
.
2
Click
Users
>
Modify User
.
3
Specify the name and context of the User or Users you want to modify, then click
OK
.
4
On the
General
tab, select the
Environment
page.
5
Fill in the property page.
Click for more information on specific properties.
6
Click
OK
.
Setting Up Extra Login Security for a User
1
In Novell iManager, click the
Roles and Tasks
button
.
2
Click
Users
>
Modify User
.
3
Specify the name and context of the User or Users you want to modify, then click
OK
.
4
On the
Restrictions
tab, fill in the property pages you want.
Click for details on any page.
5
Click
OK
.
Page
Description
Password Restrictions
Sets up a login password.
Login Restrictions
• Enable or disable the account.
• Limit the number of concurrent login sessions.
• Set a login expiration and lockout date.
Time Restrictions
Restricts the times when the user can be logged in. If you
set a restriction and the object is logged in when the
restricted time arrives, the system issues a five-minute
warning and then (after five minutes) logs the object out if it
isn’t logged out already.If the user will log in remotely, see
“Login Time Restrictions for Remote Users” on page 99
.
Address Restrictions
Restricts the network locations (workstations) that this user
can log in from. If you don’t set restrictions on this page, the
user can log in from any network location.
Account Balance
Sets up an accounting of this user's server usage.
Intruder Lockout
Lets you work with this account if it has been locked
because of intruder detection. To manage the intruder
detection setup, use the
Intruder Detection
property page of
the parent container.
Summary of Contents for EDIRECTORY 8.8 - GUIDE
Page 4: ...novdocx ENU 01 February 2006...
Page 16: ...16 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 68: ...68 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 90: ...90 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 116: ...116 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 128: ...128 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 184: ...184 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 249: ...250 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 307: ...308 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 333: ...334 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 371: ...372 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 439: ...440 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 519: ...520 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 529: ...530 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 555: ...556 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...