Next: TELNETD and FTPD
Up: Eagle User Authentication
Previous: Gateway Group
To determine whether to authenticate a user or which method to use,
Eagle exercises these rules in the order shown until one is true:
- Use any method specified as a rule service limit with auth
or do not authenticate users if noauth is specified. Refer to
section
for a description of these limits.
- If the connection is incoming and file /usr/ace/sdconf.c or
/var/ace/sdconf.rec exists, use Secure ID.
- If the connection is incoming and file /usr/adm/sg/gwpasswd
exists, use Gateway User Authentication.
- If the connection is outgoing and file /usr/adm/sg/gwpasswd
exists, use Gateway User Authentication.
- If the connection is outgoing and file /usr/ace/sdconf.c or
/var/ace/sdconf.rec exists, use Secure ID.
- Authorized telnet and ftp users can go in and out of
the protected network without identifying themselves.