Solved

Novell / AD

Posted on 2011-03-16
2
469 Views
Last Modified: 2013-11-05
Is Novell i-chain an alternative to Windows AD? Or are they different things altogether? If so what is Microsofts equivalent on Novell i-chain and what are the pros/cons of each. No links please.

I am told it handles user "authentication"? In the example I read all users have windows desktops and serv er estate is windows 2003 server, so what does the novell i chain do in terms of authentication and how does that differ to MS authentication platfroms?
0
Comment
Question by:pma111
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 40

Accepted Solution

by:
Adam Brown earned 250 total points
ID: 35149803
iChain is more of a firewall product than anything. It is very similar to Microsoft's ISA and Forefront Threat Management Gateway and they both operate in a similar way. It handles external user authentication by talking to the Novell eDirectory server to get user information and such. It probably can also integrates with AD to provide user authentication, but ISA and Forefront TMG do this as well. Novell's alternative to AD is the eDirectory system, which I don't have any direct experience administering (particularly the latest version) but is fairly unpopular due to increased overhead caused by a lack of full integration with Windows and the added cost involved (AD comes with Windows Server, Novell has additional costs on top of the Windows Server licensing).
0
 
LVL 3

Author Comment

by:pma111
ID: 35150185
Probably was the tool edirectory not ichain, it was a migration of one to the other so assume its edirectory to ad
0

Featured Post

MIM Survival Guide for Service Desk Managers

Major incidents can send mastered service desk processes into disorder. Systems and tools produce the data needed to resolve these incidents, but your challenge is getting that information to the right people fast. Check out the Survival Guide and begin bringing order to chaos.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Last week, our Skyport webinar on “How to secure your Active Directory” (https://www.experts-exchange.com/videos/5810/Webinar-Is-Your-Active-Directory-as-Secure-as-You-Think.html?cid=Gene_Skyport) provided 218 attendees with a step-by-step guide for…
Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.

751 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question