Novell Home

iChain Installation and Configuration Demo

Novell Cool Solutions: Feature

Digg This - Slashdot This

Posted: 17 Dec 2001
 

Version: iChain 2.0

The iChain Quick Guide flash movies listed below will take you through the installation and configuration process - making your iChain setup quick and painless.

iChain Introduction

iChain provides web-based security for your company's internal resources. It's directed at employees, customers, business partners, and stops any unwarranted attacks. Whether the end-user is accessing your local intranet while sitting right next to the server, or accessing via the World Wide Web on the other side of the planet, iChain remains consistent and effective. And when it comes to administrating the system, your location and network is irrelevant - a concept that embraces Novell's one Net strategy.

iChain Proxy Server

A key component of the iChain infrastructure is the iChain proxy server. The iChain proxy server becomes the primary access point for all users into the infrastructure.

To access the internet services on your network, users must log in to the iChain proxy server, which verifies all authentication requests with the iChain authorization server. The iChain proxy server communicates with the authorization server to access a users digital identity, and determine access privileges. All user identities and access privileges are stored as objects in eDirectory. The iChain proxy server uses LDAP to access this information.

The purpose of the Quick Guide flash movies is to demonstrate the initial configuration needed to remotely manage the iChain proxy perver from a web browser, and further, provide a walk through for activating much of iChain's core functionality.

These movies should serve as guides only. For detailed installation and configuration information, please refer to the product documentation located at www.novell.com/products/ichain.

iChain Authorization Server

The iChain authorization server is a cross platform service that provides two basic functions: user authentication and access control. Additionally, the authorization server stores identity information that can be used to personalize web content.

The iChain proxy server communicates with the iChain authorization server using LDAP or Secure LDAP, and verifies user credentials and appropriate access rights.

The purpose of the Quick Guide flash movies is to demonstrate the installation of the iChain authorization server, and provide a walkthrough of the iChain web configuration wizard to setup an iChain protected web server.

These movies should serve as guides only. For detailed installation and configuration information, please refer to the product documentation located at developer.novell.com/ndk/ichain.htm.


Novell Cool Solutions (corporate web communities) are produced by WebWise Solutions. www.webwiseone.com

© 2014 Novell