5.2 Authentication

Before a user can reach your corporate computer system, the user’s identification must go through an authentication process. The process guarantees that only authorized users are able to gain access to corporate information.

The following authentication approaches are available:

Your security strategy can incorporate more than one of these approaches. Different users and groups can be authenticated using different authentication methods.

NOTE:This section offers an introduction to authentication as it relates to GroupWise Mobile Server’s security strategies. For more information on selecting and implementing authentication strategies, refer to Section 6.0, Authenticating Users .

5.2.1 GroupWise or LDAP Authentication

You might be able to leverage the authentication methods you currently use to avoid duplicate effort in entering and maintaining user lists. For example, if you use Groupwise authentication, users can log on using their existing GroupWise user names and passwords. This approach to authentication can simplify the user experience and maintenance for you.

Changes to the corporate user directory automatically appear in the Intellisync administrative area. This feature eliminates any need for duplicate user administration activity. For example, it eliminates the need to remove an ex-employee from multiple directories.

5.2.2 Intellisync Authentication

Intellisync also offers an internally managed authentication option, referred to as Intellisync Authentication. With this authentication approach, user names and passwords are managed through the Intellisync Mobile Suite control. Some companies prefer this option for administrative reasons.

Even if you select GroupWise authentication, you can use Intellisync Authentication for particular subsets of users. For example, you can use Intellisync Authentication for a temporary workforce, for giving business partners access to limited information, or for testing and evaluation purposes.

5.2.3 Multiple Approaches to Authentication

As mentioned in the previous section, you can authenticate users using different approaches. A combined approach can be useful for testing or for migrating from one authentication approach to another. Intellisync Mobile Suite authenticates each user with only one method, but you can use any method for a given user.

5.2.4 Authentication and User Access

For GroupWise Mobile Server, there are two requirements for allowing a user to connect and access e-mail and PIM data:

  • Authentication with GroupWise Mobile Server
  • Access to the mail server

Section 6.0, Authenticating Users contains more information about authenticating users for all products. Section 7.0, Granting Access to the Mail␣ Server includes mail server information and applies only to Email Accelerator.