Understanding Secure Workstation Policies

Three Secure Workstation policies specify how Secure Workstation behaves:

The Local policy is stored under an ACL-protected registry key on the workstation. The Network policy is stored in eDirectoryTM and delivered to the workstation using the NMASTM Post-Login Method. (For more information, see The Secure Workstation Post-Login Method for NMAS). The Effective policy is created by combining the Local policy with the Network policy.

All three policies contain the same elements. Secure Workstation always enforces the Effective policy.

Secure Workstation reads the Local policy each time a user logs in to Windows. As long as the Novell Secure Workstation Service is running, the Local policy will be in effect during each user's Windows' session.

When a user logs in to the network using the Secure Workstation Post-Login Method for NMAS, the post-login method sends the Network policy to the Novell Secure Workstation Service. The service reads the Local policy and combines it with the Network policy to create the Effective policy. The Effective policy consists of the most secure settings from the Local policy and the Network policy.

If a user logs in to Windows but does not use the post-login method, the service creates the Effective policy by making a copy of the Local policy.