Solved

Novell / AD

Posted on 2011-03-16
2
470 Views
Last Modified: 2013-11-05
Is Novell i-chain an alternative to Windows AD? Or are they different things altogether? If so what is Microsofts equivalent on Novell i-chain and what are the pros/cons of each. No links please.

I am told it handles user "authentication"? In the example I read all users have windows desktops and serv er estate is windows 2003 server, so what does the novell i chain do in terms of authentication and how does that differ to MS authentication platfroms?
0
Comment
Question by:pma111
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 41

Accepted Solution

by:
Adam Brown earned 250 total points
ID: 35149803
iChain is more of a firewall product than anything. It is very similar to Microsoft's ISA and Forefront Threat Management Gateway and they both operate in a similar way. It handles external user authentication by talking to the Novell eDirectory server to get user information and such. It probably can also integrates with AD to provide user authentication, but ISA and Forefront TMG do this as well. Novell's alternative to AD is the eDirectory system, which I don't have any direct experience administering (particularly the latest version) but is fairly unpopular due to increased overhead caused by a lack of full integration with Windows and the added cost involved (AD comes with Windows Server, Novell has additional costs on top of the Windows Server licensing).
0
 
LVL 3

Author Comment

by:pma111
ID: 35150185
Probably was the tool edirectory not ichain, it was a migration of one to the other so assume its edirectory to ad
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A company’s centralized system that manages user data, security, and distributed resources is often a focus of criminal attention. Active Directory (AD) is no exception. In truth, it’s even more likely to be targeted due to the number of companies …
Here's a look at newsworthy articles and community happenings during the last month.
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
Suggested Courses

624 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question