How do I restrict Helpdesk functions in Netware?

Posted on 2007-10-10
Last Modified: 2008-03-06
I had set up a Novell Helpdesk group that only has rights to rest passwords, unlock the accounts.  I have to go back and recreate it since it was deleted.  I cannot find the documenation I used before to set it up.  Any help would be greatly appricated
Question by:Cered
    LVL 35

    Expert Comment

    What version of NetWare are you running?

    What SP level is it at?  What is your NDS/eDirectory version?

    Do you have a custom program for the helpdesk?  If not, do they use nwadmn32, consoleone or imanager?
    LVL 19

    Expert Comment

    Sounds like what you need is Role Based Services (if you have a version of NW that supports it). Click thre configure button in iManager, create some roles, associate them with your helpdesk group.

    I set up something similar for our helpdesks - reset password, clear lockout etc..
    LVL 34

    Expert Comment

    What you're really doing doesn't have a lot to do with NetWare. You're doing this in eDirectory, the Directory Service used for authentication and access control for most NetWare-based functions.

    That said, functionality of these products is, as ShineOn alluded to, variable based on version. So we need to know more about your environment.
    LVL 35

    Expert Comment

    Well, that's what I was driving at with my questions.  It's hard to give a definitive answer if we don't know what version of anything they use.

    All we know is they said "Netware" in the title of the question.  

    Don't know what version of NetWare or whether they have NDS or eDirectory, or whether they can use RBS.

    Author Comment

    role base - (helpdesk)  
    LVL 35

    Expert Comment

    iManager?  Version 1.3, 1.5, 2.02?
    LVL 4

    Accepted Solution

    Here is a link to setting up Role Based Services.

    iManager on NW6 (I believe this is iManage 1.x, unless you updated to a newer version)

    iManager 2.5:

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    What Is Threat Intelligence?

    Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

    Outlook Free & Paid Tools
    Password hashing is better than message digests or encryption, and you should be using it instead of message digests or encryption.  Find out why and how in this article, which supplements the original article on PHP Client Registration, Login, Logo…
    Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…
    Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

    779 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    14 Experts available now in Live!

    Get 1:1 Help Now