HP Visualize J5000 hp visualize workstation - Interoperable Security for HP-UX
HP Visualize J5000 - Workstation Manual
View all HP Visualize J5000 manuals
Add to My Manuals
Save this manual to your list of manuals |
HP Visualize J5000 manual content summary:
- HP Visualize J5000 | hp visualize workstation - Interoperable Security for HP-UX - Page 1
VISUALIZE Workstations Interoperable Security for HP-UX and Windows NT Technical Workstations By Scott Key Solution Specialist - HP Visualize J5000 | hp visualize workstation - Interoperable Security for HP-UX - Page 2
services of sub-components and processes. At first glance, it appears that there is little interoperability between HP- it has also been reported that Kerberos will be available as an alternate security paradigm. In addition, HP has released a system to provide a single HP VISUALIZE WORKSTATIONS 1 - HP Visualize J5000 | hp visualize workstation - Interoperable Security for HP-UX - Page 3
often require security that handles many levels of security across both Windows NT and UNIX systems. As more geographically dispersed collaboration is pursued in the cross discipline approach to balanced against ease of use and cost of system management 02/04/00 HP VISUALIZE WORKSTATIONS 2 - HP Visualize J5000 | hp visualize workstation - Interoperable Security for HP-UX - Page 4
at best. For example, most current versions of UNIX provide encrypted passwords in the password file. Unfortunately, the passwords are transmitted over the network as clear text. In addition, traditional UNIX does not address authentication of other systems on the HP VISUALIZE WORKSTATIONS 3 - HP Visualize J5000 | hp visualize workstation - Interoperable Security for HP-UX - Page 5
only as it relates to Remote Procedure Calls (RPC). It is reported that Windows NT 5.0 will incorporate Kerberos as a system wide authentication mechanism. This should allow Windows NT to have enhanced integration capability into the UNIX security paradigm. 02/04/00 HP VISUALIZE WORKSTATIONS 4 - HP Visualize J5000 | hp visualize workstation - Interoperable Security for HP-UX - Page 6
example, a UNIX user could be authorized to log onto a Windows NT domain or vice versa. The user authorization level, however, would be as a "Guest". This would mean that user access levels would still need to be maintained separately on Windows NT and UNIX. 02/04/00 HP VISUALIZE WORKSTATIONS 5 - HP Visualize J5000 | hp visualize workstation - Interoperable Security for HP-UX - Page 7
family includes such items as Single Sign-On, Authorization Server, VirtualVault and others. This central approach can lower the onto a UNIX system, they can use the same user name and password since these UNIX systems use the same source for authentication. 02/04/00 HP VISUALIZE WORKSTATIONS 6 - HP Visualize J5000 | hp visualize workstation - Interoperable Security for HP-UX - Page 8
administration of these engineering and scientific systems. Windows NT and UNIX are starting to address the security concerns with some of the same methodologies and protocols in an interoperable manner. Thus, even if engineering teams are geographically dispersed, HP VISUALIZE WORKSTATIONS 7 - HP Visualize J5000 | hp visualize workstation - Interoperable Security for HP-UX - Page 9
secure access to the same data could be provided today, by using DFS (Distributed File System) and DCE on both systems, in conjunction with the mentioned security processes. 02/04/00 HP VISUALIZE WORKSTATIONS 8
VISUALIZE Workstations
Interoperable Security for HP-UX
and Windows NT Technical Workstations
By Scott Key
Solution Specialist