Next: Message Log Up: Major Features Previous: Service Daemons

User Authentication

The Eagle supplements any user-authentication technologies that a network or system may employ such as Kerberos or Secure ID from Security Dynamics Incorporated. If you consider user authentication to be similar to the PIN number used on a telephone company credit card, the Eagle may be considered a device which controls the phones from which your card can be used, when they can be used, and what kinds of calls can be made and you still have your card and PIN.

The Eagle is primarily a network/host authenticator. That is, network traffic thru the gateway is restricted to a particular host or set of hosts identified by network name or address. Eagle can also identify who is initiating the network traffic. These users must identify themselves with a user name and a password or by SecurID unique key and passcode. This authentication is in addition to any other form of authorization/authentication required by the node being accessed or by the application being executed.


tkevans@delmarva.com