Solved

2 general questions:  what to use as central password server and shared calendar?

Posted on 2002-07-22
7
191 Views
Last Modified: 2010-04-20
Hi,

I'm trying to replicate as far as I can a copy of the old windows NT domain and exchange server environment for a lot cheaper in Linux

I know I can use LDAP for a centrally managed address book.    What can I use for a central managed but user editable calender for the enterprise?

In NT if a user changed his password it would change for all servers (the domain logon) and other things like his mailbox password.   What can I use in Linux to replicate this functionality?

Pros and Cons for each system please?  Any Ideas?

Bendecko

0
Comment
Question by:bendecko
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
7 Comments
 
LVL 51

Accepted Solution

by:
ahoffmann earned 100 total points
ID: 7169001
> .. central managed but user editable calender ..
StarOffice 5.2 (not 6.x !!)
Netscap/iPlanet Calender Server

> .. changed his password it would change for all servers ..
sounds like you're looking for somthing called single-sign-on. This is hard to do on linux, but possible.
Best aproach is to start with LDAP, then make all services use of LDAP. In this case I suggest to use iPlanet's calender Server, 'cause it is based on LDAP by default.
0
 
LVL 1

Author Comment

by:bendecko
ID: 7171065
I've just read that Samsung bought out HP's Openmail.

Do you know anything about it?  It seems to do everything exchange/outlook does but it means i can let everyone keep using outlook?

0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 7171288
sorry, no idea bout HP Openmail
But I'm interested too.
0
U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

 
LVL 1

Author Comment

by:bendecko
ID: 7184317
Thanks very much.  LDAP it is.

One more thing in Windows NT there is the concept of 'ownership' and you can only take ownership of files etc not give it away.  This means administrators etc have to be accountable.  Can you do this in Unix?

I'll let you know about openmail when I get a spare box to try it out on.   Looks pretty cool and something I might convince people to go for if I can utilise all the groupware features of outlook without exchange!

Regards

Ben
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 7184780
'ownerchip' on NTFS is something where M$ suggest security again, there there is no security implemeted.
It's exactly the same as it is in UNIX since roughly 30 years:
     a file can be owned by a user, and no others can change it, except the owner itself
     In UNIX it is like:
          chmod 700 file && chown user file
     The ownly difference to NTFS' 'ownerchip' is, that NT admins need to take ownerchip before they can read the file (which makes things just more complicated than needed), while on UNIX root can read it right away
0
 
LVL 1

Author Comment

by:bendecko
ID: 7200007
hi,

in NT the administrator cannot then set the ownership of the file back to the original owner.

in Linux he can? or not even have to worry as he's logged on as root can do anything?

that means he can look at things he maybe shouldn't have and no one is to know?

ben
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 7200452
I'm not shure if the administrator can give away ownership (it's tooo long when I abandoned NT), probably admin must give full access, and then the owner can take ownership again. But I know that there exist a implementation of UNIX's chown for NT (at least from cygnus).

And yes, on UNIX (as on NT) root can do anything.
IMHO, anything else does not make sence, or makes the system unusable in some situations. If a user does not like that others (even admins) read their files, then they should encrypt them, that's much more safe (even against attacks).
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

SSH (Secure Shell) - Tips and Tricks As you all know SSH(Secure Shell) is a network protocol, which we use to access/transfer files securely between two networked devices. SSH was actually designed as a replacement for insecure protocols that sen…
The purpose of this article is to fix the unknown display problem in Linux Mint operating system. After installing the OS if you see Display monitor is not recognized then we can install "MESA" utilities to fix this problem or we can install additio…
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

732 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question