Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Novell / AD

Posted on 2011-03-16
2
Medium Priority
?
472 Views
Last Modified: 2013-11-05
Is Novell i-chain an alternative to Windows AD? Or are they different things altogether? If so what is Microsofts equivalent on Novell i-chain and what are the pros/cons of each. No links please.

I am told it handles user "authentication"? In the example I read all users have windows desktops and serv er estate is windows 2003 server, so what does the novell i chain do in terms of authentication and how does that differ to MS authentication platfroms?
0
Comment
Question by:pma111
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 42

Accepted Solution

by:
Adam Brown earned 1000 total points
ID: 35149803
iChain is more of a firewall product than anything. It is very similar to Microsoft's ISA and Forefront Threat Management Gateway and they both operate in a similar way. It handles external user authentication by talking to the Novell eDirectory server to get user information and such. It probably can also integrates with AD to provide user authentication, but ISA and Forefront TMG do this as well. Novell's alternative to AD is the eDirectory system, which I don't have any direct experience administering (particularly the latest version) but is fairly unpopular due to increased overhead caused by a lack of full integration with Windows and the added cost involved (AD comes with Windows Server, Novell has additional costs on top of the Windows Server licensing).
0
 
LVL 3

Author Comment

by:pma111
ID: 35150185
Probably was the tool edirectory not ichain, it was a migration of one to the other so assume its edirectory to ad
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Always backup Domain, SYSVOL etc.using processes according to Microsoft Best Practices. This is meant as a disaster recovery process for small environments that did not implement backup processes and did not run a secondary domain controller that ne…
Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

722 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question