A.0 In-Depth Look at Authentication, Encryption, and Synchronization

This section gives you an in depth view of how NovellĀ® iFolderĀ® 2.1 authentication, encryption, and synchronization work. For an overview, see Section 2.0, Understanding the Novell iFolder Architecture.

After the iFolder software is installed and configured, users can download and install the iFolder client. For installation instructions, see the Novell iFolder Quick Start.

Before a user can use iFolder on the local workstation, you must enable the user's User object in the iFolder Management Console. You can control who is authorized to have an iFolder account by enabling User objects or, in other words, by giving those users authority to create and use iFolder accounts.

iFolder accounts are initialized the first time a provisioned user logs in to the iFolder server, using the iFolder client, the iFolder Web site Login (Java applet or NetStorage), or NetDrive. After a user account is initialized, the iFolder administrator manages it through the iFolder Management Console.

As users begin to populate their iFolder directories with data, the iFolder client supports automatic synchronization. Users can install the iFolder client on multiple workstations, which allows them to move between computers and locations easily, knowing their data is always secure, backed up on the network, and following them in its electronic footsteps so that the latest copy of their data is available from any location and at any time.