HP Visualize J280 hp visualize workstation - Interoperable Security for HP-UX
HP Visualize J280 - Workstation Manual
View all HP Visualize J280 manuals
Add to My Manuals
Save this manual to your list of manuals |
HP Visualize J280 manual content summary:
- HP Visualize J280 | hp visualize workstation - Interoperable Security for HP-UX - Page 1
VISUALIZE Workstations Interoperable Security for HP-UX and Windows NT Technical Workstations By Scott Key Solution Specialist - HP Visualize J280 | hp visualize workstation - Interoperable Security for HP-UX - Page 2
utilizes out-sourcing for engineering services of sub-components and processes. At first glance, it appears that there is little interoperability between HP-UX Security and that of Windows higher confidence levels in the data confidentiality process. 02/04/00 HP VISUALIZE WORKSTATIONS 1 - HP Visualize J280 | hp visualize workstation - Interoperable Security for HP-UX - Page 3
necessity for protection of this intellectual property. However, this protection must be balanced against ease of use and cost of system management 02/04/00 HP VISUALIZE WORKSTATIONS 2 - HP Visualize J280 | hp visualize workstation - Interoperable Security for HP-UX - Page 4
HP-UX View of Security 02/04/00 An ideal security environment would be one that incorporates the security paradigms of both Windows NT and UNIX in a consistent and integrated fashion. For example, when a change does not address authentication of other systems on the HP VISUALIZE WORKSTATIONS 3 - HP Visualize J280 | hp visualize workstation - Interoperable Security for HP-UX - Page 5
and a Shadow Password File. HP-UX also fully supports the Distributed Computing Environment (DCE) which includes the Distributed Security Services (DSS) support for a cross platform security environment integration capability into the UNIX security paradigm. 02/04/00 HP VISUALIZE WORKSTATIONS 4 - HP Visualize J280 | hp visualize workstation - Interoperable Security for HP-UX - Page 6
treat them as unauthenticated requests. These requests can be handled with the use of DCE's Cell Directory Service (CDS) and the use of ACL's within the CDS. The Kerberos method for authentication utilizes a to be maintained separately on Windows NT and UNIX. 02/04/00 HP VISUALIZE WORKSTATIONS 5 - HP Visualize J280 | hp visualize workstation - Interoperable Security for HP-UX - Page 7
3: A possible configuration for Windows NT & UNIX Security Protocol Integration The current HP Praesidium framework is a family of security products that can provide cross-platform management from these UNIX systems use the same source for authentication. 02/04/00 HP VISUALIZE WORKSTATIONS 6 - HP Visualize J280 | hp visualize workstation - Interoperable Security for HP-UX - Page 8
certificate) to individual users. This will allow directory services, like Windows NT's new Active Directory to publish For example, this could then allow authorized subcontractors access to specific data within a company's intranet firewall. Whether DCE, Kerberos , HP VISUALIZE WORKSTATIONS 7 - HP Visualize J280 | hp visualize workstation - Interoperable Security for HP-UX - Page 9
secure access to the same data could be provided today, by using DFS (Distributed File System) and DCE on both systems, in conjunction with the mentioned security processes. 02/04/00 HP VISUALIZE WORKSTATIONS 8
VISUALIZE Workstations
Interoperable Security for HP-UX
and Windows NT Technical Workstations
By Scott Key
Solution Specialist