3 security concept, 5 administration of advanced server for unix, Administration of advanced server for unix – Siemens Unix V4.0 User Manual
Page 24
Introduction to Advanced Server for UNIX
Administration
Product Manual
U7613-J-Z815-6-76
©
S
iem
e
n
s
N
ix
dor
f
In
fo
rm
at
io
n
s
s
y
s
te
m
e
A
G
1
9
9
5
P
fad
: D:
\O
7
613
e6
\u
761
3e
.k
02
2.4.3
Security concept
In order to protect shared resources from unauthorized access, the user level security
concept is always used in Advanced Server for UNIX.
Users must legitimate using their username and password once in the domain to be able
to access the shared resources for which they are authorized.
Even after you have successfully logged onto a domain, you may need to carry out
further steps to be able to use the resource of a server in another domain:
●
If you have a different password for the same user name in another domain, you
must enter this password.
●
If you have a different user name in another domain, you must log off from the
previous domain and log onto the new domain or alternatively make the
connection with the resource as a different user.
●
If there is a trust relationship between the two domains there is no need to
create the user account a second time. You can also access the resources in
the other domain if you are a legitimate user in your domain. For further infor-
mation, please refer to the
manual.
2.5 Administration of Advanced Server for UNIX
The administrator manages and controls the shared resources, users, and their permis-
sions on the UNIX server.
Advanced Server for UNIX is managed via the graphical interface of the Windows NT
Server Tools. Using this administration program you can carry out your administration tasks
remotely, e.g. from a Windows NT system (server or client) or a Windows, Windows for
Workgroups or a Windows 95/98 client if these utilities are installed there.
The administration of Advanced Server at the command prompt is described in chapter
“Administering Advanced Server at the Command Prompt”
.
Administration functions can also be carried out from programs via the programming
interface (API). For further information please refer to the manual
and the
API manual pages.
i