NetWare 4.1/9000 Concepts
1-185
NetWare Glossary
S
Inheritance Security. Passes rights from higher to lower levels. See
“Inheritance security.”
Attributes Security. Describes characteristics of directories and files. See
“Attributes security.”
Effective rights Security. Determines a user’s actual calculated rights to a
directory, file, or object. See “Effective rights security.”
Two categories of HP-UX security are
HP-UX Login Security. Controls who can access the network through HP-
UX. See “HP-UX login security.”
HP-UX Permissions Security. Determines the level of access to files and
directories of each user and group. See “HP-UX permissions security.”
Access control determines whether HP-UX permissions, NetWare rights,
both, or neither control the access to files and directories. The various
security features can be chosen per volume.
NetWare login security
The LOGIN command controls who can access the network by determining
if a valid user is attempting to log in.
A person must know the User object’s name and the correct password (if
required) to log in.
The network supervisor establishes this login security by creating a User
object in NetWare Directory Services and by then assigning values to the
properties of that user. Those values determine how the user can access the
network.
A User object’s properties affect when a user can log in, which workstations
can be used, when the user’s account is disabled, and information about the
user’s password, among other things.
Passwords aren’t required, but they should be used. Without one, an intruder
can access the network with only a user’s name. Do not use family or pet
names as passwords; they are easily guessed by an intruder.
Passwords are encrypted and are never displayed on the monitor or
transmitted across the network. The password authenticates every action of a
user.