14.4 Security Information for Dependent Products

Table 14-5 provides links to security-related information for other products that can impact the security of BCC:

Table 14-5 Security Information for Other Products

Product Name

Links to Security Information


Security for eDirectory is provided by NICI. See the NICI 2.7x Administration Guide.

Identity Manager

Security: Best Practices in the Identity Manager 3.6x Security Guide.


For information about securing iSCSI target devices on NetWare 6.5 SP8, see Configuring Access Control to iSCSI Targets in the NW 6.5 SP8: iSCSI 1.1.3 Administration Guide.

For information about securing iSCI targets and initators for Linux iSCSI solutions, see Mass Storage over IP Networks—iSCSI in the SUSE Linux Enterprise Server 10 Installation and Administration Guide.

Linux User Management (LUM)

See OES 2 SP3: Novell Linux User Management Administration Guide.

Novell Cluster Services for Linux

In the OES 2 SP3: Novell Cluster Services 1.8.8 Administration Guide for Linux, see

Novell Storage Services for Linux

In the OES 2 SP3: NSS File System Administration Guide for Linux, see:


OpenWBEM should be configured on each node to allow only the necessary users. OpenWBEM by default allows all users. For information, see Changing the Authentication Configuration in the OES 2 SP3: OpenWBEM Services Administration Guide.