Client For Open Enterprise Server Administration Guide
Client For Open Enterprise Server Administration Guide
Administration Guide
May 2019
Legal Notices
For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government
rights, patent policy, and FIPS compliance, see https://www.microfocus.com/about/legal/.
Contents 3
3.5 Advanced Authentication Credential Provider . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
6 Managing Passwords 79
6.1 Creating Strong Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
6.2 Displaying Password Requirements for End Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
6.3 Using Forgotten Password Self-Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
6.3.1 Using the “Did You Forget Your Password?” Link . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
6.3.2 Using Hints for Remembering Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
6.4 Setting Up Passwords in Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
7 Security Considerations 89
7.1 Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
7.2 Known Security Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
7.3 Security Characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
7.3.1 Identification and Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
7.3.2 Authorization and Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
7.3.3 Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
7.3.4 Security Auditing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
7.4 Other Security Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
8 Managing Login 93
8.1 Setting Up Login Scripts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
8.2 Setting Up Login Restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
8.3 Customizing the Client Login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
8.4 Setting Up the Computer Only Logon If Not Connected Feature . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
8.4.1 Enabling the Computer Only Logon If Not Connected Feature . . . . . . . . . . . . . . . . . . . . . . 98
8.4.2 Using the Computer Only Logon If Not Connected Feature . . . . . . . . . . . . . . . . . . . . . . . . 99
8.5 Logging In to the Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
8.6 Logging Out of the Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
8.7 Setting Up Login Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
4 Contents
8.7.1 Creating a System Login Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
8.7.2 Creating a System Login Profile for Use on Multiple Workstations . . . . . . . . . . . . . . . . . . 105
8.7.3 Viewing or Editing a System Login Profile's Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
8.7.4 Removing a System Login Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
8.7.5 Enabling the Use of DHCP In a System Login Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
8.8 Setting Up LDAP Contextless Login and LDAP Treeless Login. . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
8.8.1 Setting Up LDAP Services for eDirectory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
8.8.2 Setting Up LDAP Contextless Login on One Workstation . . . . . . . . . . . . . . . . . . . . . . . . . 114
8.8.3 Setting Up LDAP Contextless Login on Multiple Workstations . . . . . . . . . . . . . . . . . . . . . 116
8.8.4 Logging In Using LDAP Contextless Login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
8.8.5 LDAP Contextless Login Differences between Client for Open Enterprise Server and Novell
Client for Windows XP/2003 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
8.9 Configuring 802.1X Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
8.9.1 Enabling 802.1X Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
8.9.2 Enabling Wired 802.1X Authentication on Windows10, Windows 8, and Windows 7 . . . . 119
8.10 Enabling AutoAdminLogon. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
8.10.1 Enabling a Windows-Only AutoAdminLogon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
8.10.2 Configuring Windows-Only AutoAdminLogon Through Registry . . . . . . . . . . . . . . . . . . . . 122
8.10.3 Enabling an eDirectory AutoAdminLogon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
8.11 Enabling TSClientAutoAdminLogon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
8.11.1 Enabling the TSClientAutoAdminLogon policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
8.12 Setting Up Single Sign-On (SSO) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
8.12.1 Enabling SSO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
8.12.2 Enrolling the Windows User for SSO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
8.12.3 Enabling the Suppress Single Sign-On Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
8.13 Setting Up NMAS Based Windows Logon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
8.13.1 Enrolling Users for “NMAS for Windows Logon” . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
8.13.2 Performing an NMAS Based Windows Logon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
8.13.3 Creating an Exception List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
8.13.4 Suppressing the NMAS Support for Computer Only Logon . . . . . . . . . . . . . . . . . . . . . . . 135
8.14 Troubleshooting Service Location Protocol (SLP) Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
8.14.1 Client Service Location Diagnostic Utility (SLPINFO) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
8.15 Setting up Service Account eDirectory Login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
Contents 5
6 Contents
About This Guide
This guide describes how to configure the Client for Open Enterprise Server and contains the
following sections:
Audience
This guide is intended for network administrators.
Feedback
We want to hear your comments and suggestions about this manual and the other documentation
included with this product. Please use the User Comments feature at the bottom of each page of the
online documentation and enter your comments there.
Documentation Updates
For the latest version of this documentation, see the Client for Open Enterprise Server Web site.
Additional Documentation
For information on installing the Client for Open Enterprise Server, see the Client for Open Enterprise
Server Installation Quick Start.
For information on using the Client for Open Enterprise Server, see the Client for Open Enterprise
Server Installation Quick Start.
For information on login scripts, see the Novell Login Scripts Guide (http://www.novell.com/
documentation/linux_client/login/data/front.html).
Enterprise Server
The Client for Open Enterprise Server provides Windows connectivity to NetWare and OES Linux
servers. With the Client for Open Enterprise Server, you can browse through authorized directories,
transfer files, and use advanced services directly from Windows 10, Windows 8, or Windows 7
workstations, Windows 2012 server, Windows 2016 server, or a Windows 2019 server.
After it is installed on workstations, the Client for Open Enterprise Server lets users enjoy the full
range of OES services, including authentication via NetIQ eDirectory, network browsing and service
resolution, and secure and reliable file system access. All services are delivered through industry-
standard protocols. The Client also supports the traditional NCP protocol.
The Client for Open Enterprise Server for Windows is a separate release from the Novell Client 4.91
for Windows XP/2003. The Client for Open Enterprise Server for Windows supports both the x86 and
x64 versions of Windows 10, Windows 8, and Windows 7 and has many of the same features as the
Novell Client 4.91 for Windows 2000/XP. A separate iPrint Client that can be installed as a standalone
item and used for printing is also available.
In this guide, the Client for Open Enterprise Server is referred to as the Client.
The documentation update to reflect these changes (such as names and screenshots) is being done
in a phased manner.Until all the guides in the documentation library are modified, Novell Client and
Client for Open Enterprise Server are used interchangeably.
The screenshot provides an overview of the change to the user interfaces, logos, and so on.
However, all the client functionality remains the same.
The following is a list of changes in the "Client for Open Enterprise Server 2 SP4 (IR3)” and later, as
compared to the “Novell Client 2 SP4 for Windows (IR2)” and all previous releases:
In “Novell Client for Windows”, when the downloaded file was unzipped, by default all files were
extracted to a "C:\Novell" directory such as “C:\Novell\Novell Client 2 SP4 for Windows (IR2)”. In
“Client for Open Enterprise Server", when the downloaded file is unzipped, by default all files are
extracted to a "C:\Micro Focus" directory such as “C:\Micro Focus\Client for Open Enterprise
Server 2 SP4 (IR3)”.
In “Novell Client for Windows”, to uninstall the client using the Windows control panel or
“Settings” application, the entry name "Novell Client for Windows” was looked for. In “Client for
Open Enterprise Server”, look for the entry name “Client for Open Enterprise Server”.
In “Client for Open Enterprise Server”, all the previous Novell bitmaps and images are replaced
with “Micro Focus” branded bitmaps and images.
In “Client for Open Enterprise Server”, some of the menu items and setting names are changed,
but the functionality still remains the same. The following in the list of items that are changed
from “Novell Client for Windows” to “Client for Open Enterprise Server”.
In Client Properties:
Default Bitmap for Novell Login Dialog Default Bitmap for Novell Login Dialog
Login with Non-Novell Credential Provider Login with Third-Party Credential Provider
Prompt for Novell Login during Windows Prompt for Network Login during Windows
AutoAdminLogon AutoAdminLogon
Show Novell System Tray Icon Show Client System Tray Icon
Computer Only Logon after failed Novell Logon Computer Only Logon after failed Network Logon
“Novell Logon” tile is the name of the blank “enter a “Other User” tile is the name of the blank “enter a
different username to logon” tile. different username to logon” tile.
Change your Windows Password to match your Novell Change your Windows Password to match your
Password after a successful login. Network Password after a successful login.
Note there are many file names, Program Files directory names, and registry keys in Client for
Open Enterprise Server that continue to reflect the “Novell” or “Novell Client” branding. The goal
was to not make changes that would affect application-level compatibility or existing customer-
defined scripts that were working with the previous Novell Client for Windows. Any customer
scripts or applications that are dependent on the existing file names, directory names or registry
setting names used in the Novell Client for Windows continues to work successfully with the
Client for Open Enterprise Server.
Section 1.3.1, “Novell Client for Windows XP/2003 Features Not Included in the Client for Open
Enterprise Server,” on page 14
Section 1.3.2, “Service Location Protocol (SLP) Differences,” on page 15
Section 1.3.3, “LDAP Contextless Login Differences,” on page 17
Compatibility with any version of Windows other than Windows 10, Windows 8, Windows 7,
Windows Server 2012 or Windows Server 2008 R2.
The Novell Client 4.91 for Windows continues to support Windows XP and 2003.
Compatibility to NetWare 5.0 and all prior versions.
Graphical Login at Windows boot.
There is no direct concept of this in Windows 10, Windows 8, and Windows 7, because the
Graphical Identification and Authentication (GINA) credential input extension model was
replaced by the credential provider model. For more information, see Create Custom Login
Experiences With Credential Providers For Windows Vista (http://msdn.microsoft.com/en-us/
magazine/cc163489.aspx) and Chapter 3, “Authenticating to a OES Network,” on page 35.
Queue-based or NDPS printing support.
Printing support is provided by iPrint
16-bit applications and libraries.
Compatibility Mode Driver (CMD).
NetWare IP (NWIP).
IPX/SPX protocols and API libraries.
Catalog Services version of contextless login.
NetIdentity Client.
Bindery-mode authentication.
UNC path handling (NWFilter).
For Novell Client 4.91 for Windows XP/2003 users, there are noticeable differences between how the
Novell Client 4.x SRVLOC SLP User Agent (UA) operates and how the OpenSLP LIBSLP UA
operates. This section describe some of the significant known differences between the two SLP User
Agents.
The SRVLOC UA initiates discovery of new SLP Directory Agents (DAs) as soon as Windows
provides notification that a new TCPIP network interface was created (that is, as soon as each
network interface indicates it is physically connected and also has an IP address assigned to it).
SRVLOC initiates a DHCP Inform request for SLP configuration information and/or a multicast
query for SLP DAs at that time, as appropriate, and saves the SLP DA information learned from
each interface.
Any SLP DAs that were manually configured on the workstation are considered global, and apply
to all interfaces. Any SLP DAs that are learned through DHCP or by multicast are associated
with the specific interface over which they were learned. When a network interface becomes
disconnected, the SLP DA information associated with that interface is also removed.
When the Client issues a name resolution request through SRVLOC, all SLP scopes that the
SRVLOC UA has been configured with or learned from DAs are used when making the request.
For example, if a Novell Client 4.x machine knows of scopes “CORPORATE” and “PARTNER,” a
name resolution request is made for both “CORPORATE” and “PARTNER” on any DAs that
declared that they support these scopes.
If the SRVLOC UA was configured to support both SLP v2 and SLP v1 and the SLP v2 DAs did
not return answers for a query, or the DAs did not support the scopes being queried, the
SRVLOC UA issues an unscoped SLP v1 query to any SLP v1 DAs or by multicast to determine
whether the service was registered in the SLP v1 unscoped scope.
The SRVLOC UA supports diagnostic and status information that can be queried
programmatically. The SLPINFO.EXE tool queries and presents this information to aid in
confirming and troubleshooting SLP configurations.
When unicasting directly to an SLP DA, the SRVLOC UA uses UDP datagram communication
unless the answer being returned by the DA cannot fit within a UDP datagram. In such an event,
a TCP connection to the SLP DA is created long enough to obtain the large result.
The OpenSLP UA does not perform “preemptive discovery” of SLP Directory Agents (DAs).
Instead, the OpenSLP UA waits until there is an actual name resolution request to perform, at
which point SLP DA discovery by DHCP and multicast can occur. Both DHCP Inform discovery
of SLP configuration information and muticast-based discovery of DAs and services occur over
all active interfaces.
The OpenSLP discovery process attempts SLP scope and DA discovery in a specific order: first,
by manually configured DA and scope information; second, by DHCP-supplied DA and scope
information; and finally, by DA and scope information learned from multicast. This order is
important because the OpenSLP DA discovery process stops as soon as one or more DAs are
successfully found.
During the DA discovery process, the OpenSLP UA intends to find and use just one DA. The
OpenSLP UA looks for a DA that supports any one of the scopes the OpenSLP UA is currently
configured to use. For example, if the OpenSLP UA currently knows of scopes “CORPORATE”
and “PARTNER,” OpenSLP looks for any DA that supports “CORPORATE” or any DA that
supports “PARTNER.”
Whichever DA the OpenSLP UA finds first is the only DA (and therefore the only scope) that the
OpenSLP UA uses to obtain answers from. The OpenSLP UA does not query both the DAs
serving “CORPORATE” and the DAs serving “PARTNER.” The UA queries only one or the other.
While the OpenSLP UA supports configuration with multiple scopes and DAs, the OpenSLP UA
only expects to find or use one of those scopes (and therefore, only those DAs supporting that
scope) within a given network environment.
There is some merit in manually configuring an OpenSLP UA workstation with a list of more than
one scope and more than one DA if the workstation physically moves between networks that
require one scope versus the other. DHCP-delivered SLP configuration information can achieve
the same goal by delivering only the scope name and DA address information appropriate for the
network environment that the DHCP server serves.
The OpenSLP UA is designed for SLP v2 operation only.
As of Novell Client 2 SP2 (IR4) and later, the Client includes an SLPINFO.EXE tool for displaying
the workstation discovered SLP Directory Agents and SLP Scopes. Differences in the underlying
OpenSLP LIBSLP User Agent implementation prevent the diagnostic information from being as
granular as the Novell Client for Windows XP/2003 SRVLOC User Agent.
When unicasting directly to an SLP DA, the OpenSLP UA always uses TCP connections to the
SLP DA. UDP is still used for multicast and broadcast discovery and queries, but DA
connections are TCP-only.
The options to search by attributes other than username (for example, phone number or e-mail
address) have been disabled for the Client for Open Enterprise Server release.
Workstation Manager (there are no bundled ZENworks components as there are in the Novell
Client 4.9x for Windows XP/2003)
Novell Management Agent infrastructure components
BorderManager infrastructure components (Client Trust)
Common Authentication Service Adapter (CASA)
This section explains some advanced installation options and procedures. For information on
installing the Client on a single workstation, see the “Client for Open Enterprise Server Installation
Quick Start.”
The Client Express Installation automatically installs and configures the Client for Open Enterprise
Server. The Custom Installation lets you choose whether or not to install the following when you install
the Client:
Along with the preceded components, the Client for Open Enterprise Server installs the Microsoft
Visual C++ 2010 Redistributable Package by default. If NMAS and NICI are chosen to install when
you install the Client for Open Enterprise Server 2 SP4 (IR9) or later, then the Microsoft Visual C++
2012 Redistributable Package is also installed.
The setup.exe installation process can also be modified by using the following command line
switches:
Switch Description
/ACU Directs setup.exe to perform an upgrade of the currently installed Client software if
the version to be installed is a later one.
/NCPF Applies the Client property page settings specified in the default
NovellClientProperties.txt file. Use the Client Install Manager (nciman.exe)
to create this file. See “Creating the Client Properties File” on page 23 for more
information.
/NCPF:filename Applies the Client property page settings specified in filename. Use the Client Install
Manager (nciman.exe) to create this file. See “Creating the Client Properties File”
on page 23 for more information.
/ACU and /NCPF can be specified together at the command line. For more information, see “Using
Optional Parameters to Install the Client ” in the Client for Open Enterprise Server Quick Start.
Selecting the Use Windows language configuration option causes the Client to try and match the
language the Windows 10, Windows 8, or Windows 7 user interface is using. The Client consults the
Windows Multilingual User Interface (MUI) configuration and determines if any of the Client for OES
languages match the current MUI preferred or fallback languages.
For the initial release of the Novell Client for Windows, the language selection dialog box in
setup.exe is the only way you can make a Client language configuration change. To make a new
language selection, you must run setup.exe again and choose a different language.
If Use Windows language configuration is selected during the Client installation, the current
Windows MUI language configuration is consulted each time the Client language is queried. If the
Windows MUI language configuration changes (for example, if a user changes his or her preferred
Windows display language, or a different user who has a different preferred Windows display
language logs in), the Client re-evaluates the current Windows MUI language selections and
determine which of the available Client languages best matches the new and current MUI language.
This is because some components of the Client are not yet completely based on Unicode. Until all of
the major and required Client user interfaces operate in Unicode, the Client is limited to those
languages that can be correctly rendered through the current Windows ANSI code page (what the
Windows Regional and Language Options Control Panel dialog box refers to as Language for non-
Unicode programs).
In general, this means that users of the English, French, German, Italian, Portuguese, and Spanish
versions of Windows 10, Windows 8, and Windows 7 can select any one of these languages for the
Client language. This is because all of these languages share the same ANSI code page and can
successfully render all the other offered languages. Users of the Japanese, Polish, and Russian
versions of Windows 7 and Windows Vista, however, can select only their own language or English.
For example, a Russian version of Windows Vista will display a language selection list with only Use
Windows language configuration, Select this line to install in English, and Select this line to install
in Russian.
Even on a multi-language version of Windows, such as Windows Vista Ultimate Edition with one or
more additional Multilingual User Interface (MUI) language packs installed, there is still only one
system-wide Language for non-Unicode programs (meaning that there is still only one system-wide
ANSI code page selected in Windows at any given time). As such, even if a Windows Vista Ultimate
Edition (Russian) machine successfully installs and uses a German MUI language pack for Windows
Vista, the Client language selection dialog box still only offers English and Russian as options. This is
The Language for non-Unicode programs option can be changed to a different language, which then
affects which languages the Client installation can offer for selection. This is a system-wide setting
that affects all non-Unicode applications and not just the Client.
The Client Install Manager is located in C:\Micro Focus\Client for Open Enterprise Server 2
SP4 (IR3)\Admin (created when you unzipped the Client download file).
The Client Properties file must be copied to the root directory of the Client build (C:\Micro
Focus\Client for Open Enterprise Server 2 SP4 (IR3)) before installation.
NovellClientProperties.txt is the default filename, but you can save a properties file with any
name you want.
Figure 2-4 Client Install Manager
You can import the settings from a workstation that has been previously configured and save them to
a properties file. After you set up the workstation, click File > Import Registry in the Client Install
Manager to import the settings.
1 Start the Client Install Manager (nciman.exe), located in the C:\Micro Focus\Client for
Open Enterprise Server 2 SP4 (IR3)\Admin folder.
2 Double-click Client to open the Properties dialog box
NovellClientPropertiesFile=
DisplayLicenseAgreement=
DisplayInitialDialog=
DisplayBackground=
CreateSystemRestorePoint=
InstallNMAS=
InstallNICI=
ForceReboot=
DisplayRebootDialog=
LocalDirectory=
InstallAdvancedAuthentication=
InstallAdvancedAuthenticationDevic
eServices=
AdvancedAuthenticationClientDisco
veryHost=
AdvancedAuthenticationClientEvent
Name=
Message=
ACU's actions are determined by install.ini, a text file that can be modified to change the
behavior of the installation utilities. ACU can also accept information from a properties file you can
create by using the Client Install Manager (nciman.exe). For more information, see “Creating the
Client Properties File” on page 23.
ACU can be launched from within the login script. ACU determines if an update of the Client is
required and then launches the Setup utility (setup.exe). Launching ACU from the login script saves
network bandwidth during login because the Setup utility runs only if the Client needs to be updated.
If it is run automatically, the Update Agent determines if the preconfigured number of days have
elapsed since the last upgrade check and then checks the specified location for a newer version of
the client. If a newer version is found, the new install is launched. You can preconfigure the interval of
days as well as the location of the newer client version.
IMPORTANT: Before workstations can check to see if updates are available, the Update Agent must
be configured during the Client installation or from the Client Property Pages.
1 Create a Client properties file by running the Client Install Manager utility (nciman.exe).
See “Creating the Client Properties File” on page 23.
2 Double-click Client, then click the Update Agent tab.
3 (Optional) Select the Enable Automatic Update Agent option and specify the launch interval.
4 Select Update Location, then specify the Update Location path (mapped drive or UNC path).
5 (Optional) Select Previous Install Location.
For more information on using login scripts, see “Distributing the Client Using Login Scripts” on
page 27. For more information on using ZENworks, see the documentation associated with the
installed version of ZENworks.
1 In Novell iManager, make sure you are in the Roles and Tasks view by clicking on the top
button bar.
2 Select Users > Modify User
3 Specify a username and context, then click OK.
4 Click General > Login Script.
5 Type the login script commands and information in the Login script box.
For a sample of the login script commands that you need to add to the scripts, see “Sample
Client Installation Login Script” on page 28.
IMPORTANT: Make sure that you edit the sample login script to match the server names,
directory paths, and specifications of your own network.
For additional information on all login script commands, see the Novell Login Scripts Guide
(http://www.novell.com/documentation/linux_client/login/data/front.html).
6 To save the login script, click OK.
NOTE: In this sample, the text that is necessary to the script is represented in uppercase letters. The
information that you should customize for your network is in lowercase letters.
An Always trust software from Novell, Inc. option is also available. If you select this option, Windows
adds the Novell, Inc. certificate to the Windows Trusted Publishers certificate list for the current
Windows machine. The next time this Windows machine encounters driver software signed with the
same Novell, Inc. certificate, Windows proceeds with installation rather than prompting you again for
confirmation.
If you want to keep Windows from presenting this installation approval (for the Client or for any other
driver software using publisher-signed Authenticode signatures), you can pre-distribute the
publisher's public certificate used for Authenticode signing to the Windows machines Trusted
Publishers certificate list prior to installation of the driver software.
NOTE: Pre-distributing the Novell, Inc. certificate as a Trusted Publishers certificate on the
workstation only eliminates the Microsoft publisher verification prompt that Windows presents during
Client for Open Enterprise Server installation. To eliminate other confirmation prompts presented by
the Client installation program, see the INSTALL.INI settings in Section 2.3, “Using the Install.ini File,”
For the Client, the certificate used for Authenticode signing is the Verisign public certificate for Novell,
Inc. The best way to obtain the correct certificate for use in the Trusted Publishers list is to install the
Client on a Windows machine, then select the Always trust software from Novell, Inc. option when
prompted. Then use the Microsoft Certificate Management Console (certmgr.msc) to export the
Novell, Inc. certificate visible in this Windows machine's Trusted Publishers certificate list.
The exported certificate can be used to pre-distribute Novell, Inc. as a Trusted Publishers certificate
on Windows machines using any of the methods Microsoft makes available for pre-loading
certificates used by Authenticode-signed software. This includes Microsoft support for distributing
certificates during unattended installations of Windows, or through the use of Group Policies.
For more information on the options provided by Microsoft Windows for distributing software publisher
certificates, see the “Deploying Authenticode Digital Certificates in an Enterprise” section of Using
Authenticode to Digitally Sign Driver Packages for Windows Server 2003 (Authenticode.doc, http://
www.microsoft.com/whdc/driver/install/authenticode.mspx), and the Microsoft Windows Group Policy
documentation (http://www.microsoft.com/grouppolicy/).
For example, the Novell, Inc. certificate used to sign the Novell Client 2 SP1 for Windows (IR2)
release till the Novell Client 2 SP3 for Windows (IR1) release is valid from April 2010 to April 2013, so
pre-distributing this certificate will work for automatically approving any of the Novell Client software
releases that occurred in this time period.
The next Novell Client for Windows release after April 2013, such as the Novell Client 2 SP3 for
Windows (IR2), will be signed with a new Novell, Inc. certificate which is valid from April 2013 to April
2016. Customers who want to pre-distribute the Novell, Inc. certificate necessary to approve Client
releases that occur during the time period April 2013 to April 2016 must obtain the updated certificate
from one of the post April 2013 releases, and then distribute this updated Novell, Inc. certificate as a
Trusted Publisher on the workstations.
Client software that was signed using the Novell, Inc. certificate which expired in April 2010 can
continue being successfully installed and used even after April 2010. This is an intentional aspect of
the Microsoft Authenticode signing behavior, which permits a signed file to also be given an
independent time stamp signature. The time stamp signature allows Windows to validate that the
signing certificate was valid at the time the files were signed, even if the signing certificate has
subsequently expired.
Expiration of the existing Novell, Inc. certificate simply means that no future releases of the Client
software will be signed with this same certificate. The next Client release after the expiration date will
be signed with a different Novell, Inc. certificate, with a new start date and a new expiration date.
Windows continues to consider the expired Novell, Inc. certificate as valid. That is, Windows will
continue being able to successfully verify software that had been signed with this certificate during
the time period when the certificate was not yet expired.
This behavior of an expired certificate still being able to be validated is an intentional aspect of the
Microsoft Authenticode signing behavior, which permits a signed file to also be given an independent
time stamp signature. The time stamp signature allows Windows to validate that the signing
certificate was valid at the time the files were signed, even if the signing certificate has subsequently
expired.
For the Novell Client 2 SP1 for Windows (IR2) release till the Novell Client 2 SP3 for Windows (IR1)
releases which were signed with the Novell, Inc. certificate valid from April 2010 to April 2013,
Windows will continue verifying and allowing this software to install and run even after April 2013.
This also means that if you have the Novell, Inc. certificate valid from April 2010 to April 2013 installed
as a Trusted Publisher on the workstation, this certificate need to remain in the Trusted Publisher
certificate store even after April 2013, to permit Windows to continue pre-approving the trusted
publisher prompt that will occur when installing any of these previous Novell Client 2 SP1 for
Windows (IR2) till Novell Client 2 SP3 for Windows (IR1) releases that were signed with this
certificate, which is expired now.
Only having the latest Novell, Inc. certificate in the Trusted Publishers certificate store does not
guarantee the pre-approval of the publisher verification prompt that Windows presents during Client
for Open Enterprise Server installation. More specifically, you must have the certificate that was used
to sign that particular release of the Client being installed, Which might be the latest Novell, Inc.
certificate or a previous Novell, Inc. certificate (expired now) depending upon when the particular
Client release was made. Windows supports importing or maintaining multiple versions of the Novell,
Inc. certificate (both expired and non-expired) concurrently, as needed to have the certificate
necessary for the version(s) of Client being installed.
Should you want to import the Novell, Inc. certificate onto a single machine using the Microsoft
Certificate Management Console (certmgr.msc), an important aspect will be to import the Novell, Inc.
certificate into the Trusted Publisher certificate list that will be available to the Windows machine
during driver installation, as opposed to the per-user Trusted Publisher certificate list that is specific to
the current logged-on user.
1 Run CERTMGR.MSC (normally; do not have to force elevation via "Run as Administrator").
2 From the View menu, select Options and enable "Physical certificate stores".
3 Expand "Trusted Publishers" and select/highlight the "Local Computer" store.
4 Right-click on the "Local Computer" store, and from "All Tasks" choose "Import".
5 Browse to the Novell, Inc certificate which had been exported from a different Windows machine,
and on the "Certificate Store" page of the import wizard, ensure "Trusted Publishers\Local
Computer" is selected.
6 Complete the Import wizard, and ensure the Novell, Inc. certificate shows under "Trusted
Publishers\Local Computer" in the CERTMGR.MSC console.
The selection of the Local Computer certificate store during the certificate import process is what
ensures the Novell, Inc. certificate is being imported in a way that will be available as a Trusted
Publisher to the Windows driver installation process. Again, this all happens automatically when
using the Always trust software from Novell, Inc. option during an interactive Client installation.
For additional information on the Trusted Publishers certificate store and the Local Computer
certificate store, see Trusted Publishers Certificate Store (http://msdn.microsoft.com/en-us/library/
ff553504(v=VS.85).aspx) and t (http://msdn.microsoft.com/en-us/library/windows/hardware/
ff548653%28v=vs.85%29.aspx).
For successful installation of Client on Windows 7 and Windows Server 2008 R2, ensure to install the
Microsoft Security Update KB3033929 to add support for SHA-2 certification.
Section 2.7.1, “Installing Advanced Authentication Client with Client for Open Enterprise Server,”
on page 32
Section 2.7.2, “Enabling Advanced Authentication Integration Functionality,” on page 33
Section 2.7.3, “Advanced Authentication Settings in Install.ini,” on page 33
6a Select the Credential Provider you want to use for logging in to the workstation from the
Login experience for Advanced Authentication support: list.
6b (Optional) Specify the DNS name or IP address of the Advanced Authentication Server in
Advanced Authentication Server (optional):.
6c (Optional) Specify an alternate Advanced Authentication event name for non-domain
Windows logon in Advanced Authentication Event Name (optional):, then click Next to
complete the Client for Open Enterprise Server installation.
After successful installation of the Advanced Authentication Client and Client for Open Enterprise
Server, a new parameter Advanced Authentication is listed in Client Properties > Advanced Login
tab > Parameter group list and is set to Enabled by default. This setting enables the Client to use
Advanced Authentication when performing an eDirectory login.
NOTE: Installing Advanced Authentication Client during the installation of Client for Open Enterprise
Server versions between 2 SP4 (IR6) and 2 SP4 (IR10) sets the Advanced Authentication parameter
to On and sets the existing parameter Login With Third-Party Credential Provider to On. This setting
enables the eDirectory login attempt using the Windows credentials after the Windows-only logon
If setup.exe detects that the Advanced Authentication Client is already installed on the workstation,
even though the Advanced Authentication Client is not installed along with Client for Open Enterprise
Server, the parameters Advanced Authentication is set to Enabled by default in Client Properties.
This is because, the parameter InstallAdvancedAuthentication is set to Yes in the install.ini
file.
NOTE: If the Client for Open Enterprise Server version is between 2 SP4 (IR6) and 2 SP4 (IR10), the
parameters Advanced Authentication and Login With Third-Party Credential Provider is set to On
by default in Client Properties.
Controls the installation of Advanced Authentication Client during the Client installation if the
Advanced Authentication install packages are available in the Client installation set. If this option
is set to Yes, the Advanced Authentication Client check box is selected by default during Custom
Installation. For Express Installation, this option controls whether Advanced Authentication Client
has to be installed in addition to the Client for Open Enterprise Server.
InstallAdvancedAuthenticationDeviceServices=[Yes/No]
This option is valid when InstallAdvancedAuthenticationClient is set to Yes because,
Device Services cannot be installed without installing Advanced Authentication Client. This
option controls the installation of Advanced Authentication Device Services during the Client
This section describes the methods used on Windows 10, Windows 8, Windows 7, Windows Server
2012, Windows Server 2016, and Windows Server 2019 to authenticate to a OES network. Previous
versions of the Novell Client used a custom authentication component called the Graphical
Identification and Authentication (GINA) dynamic link library to provide authentication services on
Windows operating systems prior to Vista. The GINA technology is not available on the Windows 10,
Windows 8, Windows 7, Windows Server 2012, Windows Server 2016, and Windows Server 2019
platforms, having been replaced by a new method of collecting logon credentials called Credential
Providers.
In Windows 10, Windows 8, Windows 7, Windows Server 2012, Windows Server 2016, and Windows
Server 2019 the Winlogon process launches the LogonUI process after it receives a SAS event.
LogonUI queries each Credential Provider for the number of credential tiles that it wants to display. A
Credential Provider might, for example, display a tile for each local machine user. One of these tiles
can be configured to be the default tile initially displayed to the user. After LogonUI is finished
querying the Credential Providers for their tiles, it displays all of the enumerated tiles to the user. After
the user supplies information for the requested fields, LogonUI submits the credentials for
authentication.
Credential Providers are not enforcement mechanisms. They are used only to gather and serialize
credentials. The Local Security Authority and authentication packages enforce security. Credential
Providers are responsible for:
Even though multiple Credential Providers can be displayed to a user on a machine, only the one
selected by the user is allowed to provide credentials to the interactive logon process.
In the Client for OES, users are expected to authenticate to the network first using the Client for OES
Credential Provider and then to their PC using Live ID. Or, you can combine your network login and
your Windows Live ID login in the Network login screen.
NOTE: Ignore the From: list box for now. It will be disabled in case of a Windows Live ID login.
Also, the change password feature is not supported by Client for OES when Windows Live ID is used
for computer log in.
3.2.1 Logon
Because it is not possible to provide a logon tile that represents each individual user in an eDirectory
tree, only two logon tiles are displayed on the desktop.
The first logon tile represents the last user who successfully logged on interactively. This tile is
provided as a convenience for the single-user workstation, because it allows a user to log on
interactively by simply entering his or her password.
The second logon tile allows the user to specify all necessary local and network credential
information. This lets any eDirectory user log on interactively.
Each logon tile also allows the user to log in to only the local machine and bypass the network logon
(using the Computer Only Logon option). The Network logon tile also provides a link (Show
Advanced Options) that allows users to interact with the Advanced Options dialog box, which lets
users specify the eDirectory tree, context, and server they want to log in to.
Figure 3-8 Advanced Options Dialog Box
The logon tile provides an option Computer Only Logon to log in only to the local machine and
bypasses the network logon. It also provides a link, Show Advanced Options that allows users to
interact with the Advanced Options dialog box. The Advanced Authentication tab in the dialog box
allows the user to specify the Advanced Authentication username, Repository, and server
information.
Next, the Credential Provider provides an interface to specify the information for Advanced
Authentication logon based on the authentication method configured for the user.
Upon successful Advanced Authentication logon, the eDirectory and Windows logon proceeds
transparently.
NOTE: If you want to use Advanced Authentication Credential Provider instead of using Client for
OES Credential Provider for the logon experience, you must change the following parameters in the
Client Properties > Advanced Login.
If the Client for Open Enterprise Server is enabled with Advanced Authentication, the locked user
account is represented by a logon tile. To unlock, the user is required to perform the Advanced
Authentication logon based on the Advanced Authentication method configured. An Advanced
Authentication logon proceeds using the same Advanced Authentication user which logged this user
into eDirectory and the workstation will be unlocked using the Windows account credentials retrieved
from that successful Advanced Authentication logon.
1 Click the Start button, then click the arrow next to the lock button.
2 Click Switch User.
3 Click the Network Login tile.
4 Specify the credentials for a new user logon (either to eDirectory and Windows, or to Windows
only by selecting the Computer Only Logon link), then click the right-arrow button.
NOTE: When logging in to a Windows workstation using the Client for OES Credential Provider, OES
connections made during the login will persist only if you are not currently logged in to the
workstation. If your Windows 7 account is already logged in, you will be restored to that existing
session when you log back in to the workstation. This applies to both Fast User Switching and
connecting via Remote Desktop Connection.
Even though existing logged-on user sessions are not enumerated as visible tiles, it is still possible to
re-connect with existing logged-on user sessions by specifying login information which ultimately
matches the Windows account of the existing logged-on user session. (And, in the case of Windows
Terminal Service Remote Applications, must also match the same TS RemoteApp as the current
logon session is running.)
If you specify the correct Windows account password and continue with the login, the Client then logs
you in to both eDirectory and Windows.
If users have the permissions necessary to change their Windows account password, and it’s desired
that the eDirectory account password and Windows account password match during future logons,
selecting the Change your Windows password to match your Network password after a successful
login checkbox will syncronize the account passwords after the correct credentials have been
provided.
For example, you can change your Network password and your Windows password, or you can
change only your Network password.
6 Click OK.
You will receive a message telling you that your password has been changed.
7 Click OK to close the message.
4 Press Enter.
You will receive a message telling you that your password has been changed.
5 Click OK to close the message.
Type your current network password in the Old Password field, type your new password in the
New Password field, then retype the new password in the Confirm New Password field.
5 Click OK.
You will receive a message that your password has been changed.
6 Click OK to close the message.
The existing Advanced Authentication credential provider obtains its configuration from the
config.properties file setting, or performs DNS discovery if the config.properties is not
configured.
The Windows account password is set the same as user’s eDirectory account password for an
automatic and transparent eDirectory login to be successful.
To log in to Windows, on the Advanced Authentication login page, the user must provide the user
credential in the format Advanced Authentication user repository\username. Further login
requirements are based on the enrolled methods that are required by Advanced Authentication for
the Windows user login. For more information on configuring Advanced Authentication methods, see
Advanced Authentication Administration Guide.
NOTE: For a non-domain joined Windows workstation, when logging in with Advanced Authentication
for the first time, the Advanced Authentication credential provider prompts for additional Windows
account credentials. This information is used to map the local account to the domain account of the
user.
After the user has successfully completed the required Advanced Authentication methods and before
the Windows user desktop is displayed, the Login with Third-Party Credential Provider functionality of
Client for Open Enterprise Server performs the eDirectory login.
If the user has not logged into eDirectory before from this workstation, or if the eDirectory tree name,
eDirectory context, or eDirectory password are incorrect, then the Client for Open Enterprise Server
prompts the user to provide correct eDirectory information to complete the eDirectory login. The
information thus provided for the first time the user logs into eDirectory successfully is saved for
future logins.
When the Windows user desktop is displayed after successful login, the user is logged in to both
Windows and eDirectory.
If the user disconnects their NCP connections or logs out of eDirectory, the Client for Open Enterprise
Server requires the user to perform the Advanced Authentication log in again to access eDirectory.
You can optimize the Client for your network by using property pages to configure the parameters.
By default, the Client is configured for high speed with moderate use of memory and data protection.
You can adjust the Client to optimize its performance in any of these areas. However, optimizing the
Client in one area might lessen performance in other areas.
1 Start the Client Install Manager (nciman.exe) located in the C:\Micro Focus\Client for Open
Enterprise Server 2 SP4 (IR3)\Admin folder (created when you unzipped the downloaded
file).
2 Click Settings.
TIP: You can configure one workstation the way you want other workstations to be configured,
then use the Install Manager to import the settings from that workstation’s registry and save them
to the properties file you will use during the install. After you set up the workstation, click Import
Registry to import the settings into the Install Manager.
This page contains one option, Product name, which displays the product name and version.
Figure 4-1 Client Property Page
Use the Parameter groups drop-down list to display all the advanced login parameters or to sort the
parameters by function (Execution Options, Password, and Shown on Login). Select the parameter
you want, then use the Setting option to configure the parameter. For most parameters, this consists
of simply turning it On or Off. Some parameters require a filename or text or number setting. A short
description of each parameter is available in the Description field when you select the parameter.
802.1X Authentication: Enables or disables the use of 802.1X authentication during login. For
more information, see Section 8.9, “Configuring 802.1X Authentication,” on page 117.
Advanced Authentication: Enables or disables the use of Advanced Authentication when
performing eDirectory login.
NOTE: On a fresh install of Advanced Authentication Client and Client for Open Enterprise
Server 2 SP4 (IR 11) or later, the default option is Enabled.
For more information, see Section 2.7, “Installing and Configuring Advanced Authentication
Client,” on page 31
NOTE: This setting takes effect only when the "Password Expiry Warning" setting is also
enabled.
This parameter is set to 0 by default and has a valid range of 0 to 120 days.
Force Grace Login Password Change: This setting forces users to change their passwords at
the last grace login. With this setting activated, when the password expires, the password must
be changed in order to successfully log in.
Forgotten Password Prompt: Specifies whether the Did you forget your password? prompt is
displayed in the Login dialog box. This prompt provides an option to recover from a forgotten
password based on an administrator-defined password policy. See Section 6.3, “Using Forgotten
Password Self-Service,” on page 81 for more information.
Last Logged On User: Specifies whether the last logged on user is displayed along with the
Network Logon when logging on to the computer. Note this does not override the fact that the
last logged on user is not displayed on Windows Server 2012 when Terminal Services are
installed.
Last Logged On User Default User: Forces the "Last Logged On User" presented by Client to
always be the user that is specified, regardless of which user has logged in last. If no value is
specified, the default behavior is to specify the previously logged in user. The default value of
this parameter is blank.
Last Logged On User Default Profile: Indicates which Client Login Profile should be used in
conjunction with the "Last Logged On User Default User”. If no value is specified, the default
behavior is to use the Client Login Profile that was previously selected for the user, if more than
one Client Login Profile is available.
For example, when configuring a specific "Last Logged On User Default User" that should
always be shown by default, it might be desirable to configure "Last Logged On User Default
Profile" as "Default" (or a different Client Login Profile name that has been created) so that a
specific Client Login Profile will always be selected by default.
Login Profile List: Specifies whether the Login Profiles drop-down list on the Client Login
dialog box is enabled.
Login Windows password synchronization option default: This is the default state of the
Change your Windows password to match your Network password functionality that occurs
during login to both eDirectory and Windows when the password are not already synchronized.
This setting controls the default synchronization behavior that will occur, regardless of whether
the "Show login Windows password synchronization option" is allow the checkbox to be shown
to the user or not.
Login With Third-Party Credential Provider: This setting controls whether an OES login will
still be attempted after the Windows logon, in cases where the Client's credential provider was
not used during the Windows logon.
Make Script Tab Read Only During Login: Disables all the fields in the Script tab during login
to prevent users from overriding any of the Script tab settings.
If it is configured to check automatically, each time a user logs in to the network, Update Agent runs
and determines if the preconfigured number of days have elapsed since the last upgrade check, then
checks the specified location for a newer version of the client. If a newer version is found, ACU then
launches the appropriate installation process.
Before workstations can check to see if updates are available, the Update Agent must be configured
during a software installation. Or, you can configure the Update Agent on each machine locally
through the Client Property Pages.
The Update Agent is configured by modifying the Update Agent property page settings or (optionally)
the Install.ini file. Because the Update Agent launches ACU, which in turn launches setup.exe,
all of the configuration changes made to these subsequent utilities are used in the same way they
would be when not running the Update Agent. For more information, see Setting Up the Client Update
Agent.
Enable Automatic Update Agent: Select this check box to enable the automatic update agent,
then use the Update Agent launch interval option to set the interval (in days) that the Client
Update Agent will check for a new version of the Client for Open Enterprise Server.
Update Source(s): Select the Update Location check box to enable the Client Update Agent to
look for a new version of the Client in the designated update location.
The Update Agent checks for updates: first, in the Update Location; and second, in the Previous
Install Location.
The Update Agent looks in each enabled location for a valid set of Client installation files. Make
sure that you that you have the latest Client installation files in the first location that the Update
Agent searches.
Latest Client Properties File: Displays the name, date, and time of the most recent Client
properties file used to apply Client settings on this workstation. For more information, see
Section 2.2.1, “Creating the Client Properties File,” on page 23.
Use Administrator Privileges: If this option is selected, the Update Agent uses the Client
Update Agent service to install the Client. The service runs with elevated privileges required for a
non-administrator to install the Client. If this setting is not selected, the user must be able to
elevate to an administrator user to complete the Client installation.
Scope List: A list of scope names to be reported to SLP applications on a workstation. Multiple
scope names are allowed. The list order reflects the preference order. Scopes can also be
configured via DHCP or discovered dynamically from Directory Agents.
A scope is like a collection of services within a logical group. You might want to use a scope to
create a group of directory agents and services registered with these directory agents in a large
organization.
To add a scope to the list, specify a name, then click Add. To remove a scope from the list, select
a name in the Scope list, then click Delete. To replace a scope in the list with a new scope, type
the name of the new scope, select the name of the item you want to replace, then click Replace.
Use the Up and Down buttons to move a scope up or down in the list.
Directory Agent List: A list of SLP Directory Agent addresses. Multiple Directory Agent
addresses are allowed. Each address is a fully qualified domain name (DNS), or a dotted
decimal IP address. Directory Agents can also be configured via DHCP, or discovered
dynamically.
To add a Directory Agent to the list, specify a name, then click Add. To remove a Directory Agent
from the list, select a name in the Directory Agent list, then click Delete. To replace a Directory
Agent in the list with a new Directory Agent, type the name of the new Directory Agent, select the
name of the item you want to replace, then click Replace. Use the Up and Down buttons to move
a Directory Agent up or down in the list.
Use the Parameter groups drop-down list to display all the Advanced Settings parameters or to sort
the parameters by function (Connections, Packet Management, Performance, Cache, and SLP).
Select the parameter you want, then use the Setting option to configure the parameter. For most
parameters, this consists of simply turning it On or Off. Some parameters require a number setting. A
short description of each parameter is available in the Description field when you select the
parameter.
NOTE: After mapping a network drive using a script, if you change the eDirectory tree context,
the same drive letter is used for mapping. You might loose all the unsaved changes that are
associated with the previous eDirectory tree context.
Lazy Close: Delays the file close on the network, allowing the file to be reopened without
accessing the network. This parameter is turned “OFF” by default.
Lazy Close Directory Timeout: Determines the time, in milliseconds, that Lazy Close will delay
before closing a directory or volume handle.This parameter is set by default to 2000 milliseconds
and has a valid range of 100-15000 milliseconds.
Lazy Close File Timeout: Determines the time, in milliseconds, that Lazy Close will delay
before closing a file handle.This parameter is set by default to 500 milliseconds and has a valid
range of 100-15000 milliseconds.
NOTE: The Lazy Close File and Directory timeouts can be configured according to file access
patterns to maximize performance improvements. Client workstations that predominantly access
files exclusively can benefit from higher lazy close timeout values. On the other hand, client
Maximum Delayed Writes: Controls the maximum amount of data, in megabytes, that will be
allowed to queue for background writing when File Caching parameter is set to Read and Write.
It is recommended to use a smaller value because setting larger values may impact available
Windows kernel mode memory. Default value is set as 4MB
Receive Broadcast Messages: Tells the client which broadcast message, if any, to receive.
You can choose one of the following settings: All (receive all broadcast messages), Server Only
(receives broadcast messages sent by the server only), or None (do not receive any broadcast
messages).
Server Time Zone Configuration Cache Timeout: Determines the time interval (in minutes)
for which Client will cache the server time zone configuration for an NCP connection. After this
time interval is over, Client queries the server again to determine the current time zone
configuration. This refresh of the server's time zone configuration helps the Client workstation
respond to Daylight Savings Time events or other time zone configuration changes that occur on
the server. This parameter is set by default to 60 minutes and has a valid range of 1 to 720
minutes.
Signature Level: Determines the level of enhanced security support. Enhanced security
includes the use of a message digest algorithm and a per connection/per request session state.
The values are as follows: 0 = disabled, 1 = Enabled but not preferred, 2 = Preferred, 3 =
Required. Setting the value of this parameter to 2 or 3 increases security but decreases
performance.
SLP Broadcast Only: Enables or disables a broadcast only network for this SLP agent. If this
option is set to On, the SLP agent must send only broadcast messages (in other words, it forces
broadcasts to be used instead of multicasts). If this option is set to Off, the SLP agent can send
multicast messages.
SLP Maximum Results: Specifies the maximum number of results to accumulate and return for
a synchronous request before the timeout, or the maximum number of results to return through a
callback if the request results are reported asynchronously.
UNC Path Filter: Enables or disables the UNC Path Filter. Filters requests for UNC path
resolution sent to the Client for Microsoft Networks (Microsoft redirector). When enabled, UNC
path queries sent to the Microsoft redirector will first be filtered by the Client to determine if the
server name is known to be a OES resource. If it is determined to be a OES resource, the UNC
path request will not be allowed to proceed to the Microsoft redirector. This can help avoid
unnecessary delays caused by repeated failing attempts to access the OES resources as
though it might be a Windows server.
Select the parameter you want, then use the Setting drop-down menu to turn the parameter On or
Off. A short description of each parameter is available in the Description field when you select the
parameter.
Change Password: Enables or disables the ability of users to change their passwords. The
Change Password button is found in the Client Password Administration dialog box. See Enable
Password Administration for more information on this dialog box.
Display DFS Junction Information Page: Display or hide the DFS Junction Information tab.
The DFS Junction Information tab is found by selecting Properties from the context menu of a
DFS Junction on a OES server.
Display Directory Map Object Page: Display or hide the Directory Map Object page. The
Directory Map Object page is accessed by selecting Properties from the context menu of the
selected Directory Map Object icon in the Network folder.
Display OES Information Page: Display or hide the OES Information tab. The OES
Information tab is found by selecting Properties from the context menu of a volume, directory, or
file on a OES server.
Display OES Rights Page: Display or hide the OES Rights tab. The OES Rights tab is found by
selecting Properties from the context menu of a volume, directory, or file on a OES server.
Display OES Volume Information Page: Display or hide the OES Volume Information tab. The
OES Volume Information tab is found by selecting Properties from the context menu of a
volume.
Display OES Volume Statistics Page: Display or hide the OES Volume Statistics tab. The OES
Volume Statistics tab is found by selecting Properties from the context menu of a volume.
Enable Authenticate to Server: Enables or disables authenticating to a server. The
Authenticate menu item is displayed in the context menu of a server.
Enable Authenticate to Tree: Enables or disables authentication to a tree. The Authenticate
menu item is displayed in the context menu of a tree.
Enable LDAP Treeless Login: To enable treeless login, select this check box. Treeless login
makes it possible to log in to the network without specifying a tree.
Enable LDAP Contextless Login: To enable LDAP contextless login, select this check box.
You must have LDAP Services for eDirectory installed on your corporate server hosting the
corporate tree to take advantage of LDAP contextless login.
Enable LDAP Context Search Scope: Use this option to limit the search scope to a specific
context or to a specific context and subtree.
Trees: Lists the eDirectory trees running LDAP Services that will be searched during login.
To add a tree to the list, specify a tree name in the Trees field, then click Add. To delete one or
more trees from the list, select the trees and click Delete. These trees are no longer searched
during login. To set a tree’s context scope information, select a tree from the list, then click
Properties. You can limit the scope of the search by selecting Search Context Only in the Tree
Properties dialog box.
Servers: Lists the servers associated with the tree running LDAP Services.
To add a server, enter a server name in the Servers box, then click Add. Servers are searched in
the order they appear in this list. You can rearrange the search order by clicking Up or Down. To
delete one or more LDAP servers, select the servers and then click Delete. To set the LDAP
server timeout and data encryption settings, select the server from the list, then click Properties.
Settings: Opens the LDAP Contextless Login Parameters dialog box. Select the parameter you
want, then use the Settings option to configure the parameter. For most parameters, this
consists of simply turning it On or Off. Some parameters give you other configuration options. A
short description of each parameter is available in the Description field when you select the
parameter.
All configured name service providers are queried asynchronously in order to resolve the name to an
address. They are first queried with a cache flag that allows name service providers (NSP) who
maintain a cache to attempt to resolve the name. If no NSP resolves the name then they are queried
again without the cache flag, allowing all NSPs to attempt to resolve the name. Service Location
Protocol queries SLP for eDirectory and Bindery names.
1 Make sure that the Update Agent is configured on each workstation and that the Update
Location has been specified.
You can check the Update Agent settings in the Client Properties dialog box (right-click the
icon in the notification area of the taskbar > Client Properties > Update Agent).
NovellClientPropertiesFile=name_of_the_properties_file.txt
Replace name_of_the_properties_file.txt with only a filename, because the Update Agent does
not accept paths. The file must exist in the directory that the Update Agent is trying to update
from.
5 (Optional) Make any additional changes to the Install.ini file.
6 Run the Update Agent from the workstation.
After settings are updated, the pathname, date, and time of the Client properties file is displayed in
the Last Client Properties File field on the Update Agent property page.
Open Enterprise Server (OES) and NetWare networks restrict access to network files and folders
based on user accounts. For example, a user connected to the network using the Administrator
account can delete or rename a file that other users can only open and edit.
The OES file system keeps track of the rights that users have to files and directories on the network.
When users try to access any file on the network, Novell File Services (NFS) either grants access or
prohibits certain things that users can do with the file.
For more information on the specific rights on NetWare and OES servers, see “File Services” (http://
www.novell.com/documentation/oes/implgde/data/filesvcs.html) in the OES Planning and
Implementation Guide.
For additional information on file system attributes, see the File Systems Management Guide for OES
(http://www.novell.com/documentation/oes/stor_filesys/data/hn0r5fzo.html).
Rights are granted and revoked by creating trustee assignments. For more information, see
Section 5.2, “Changing Trustee Rights,” on page 74. File rights apply only to the file that they are
assigned to. The rights can be inherited from the folder that contains the file. Folder rights apply not
only to the folder but also to the files and folders it contains.
Trustee assignments override inherited rights. To change an Inherited Rights Filter, click Inherited
Rights and Filters.
1 In Windows Explorer, right-click the file or directory that you want to add a trustee to.
2 Click Properties.
3 Click the OES Rights tab.
4 In the tree diagram, locate the eDirectory user object that you want to add as a trustee, then click
Add.
5 Set the rights for this user by selecting the boxes under the letters on the right of the Trustees
list.
The following rights can be set for each trustee:
Read: For a directory, grants the right to open files in the directory and read the contents or
run the programs. For a file, grants the right to open and read the file.
Write: For a directory, grants the right to open and change the contents of files in the
directory. For a file, grants the right to open and write to the file.
Erase: Grants the right to delete the directory or file.
1 In Windows Explorer, right-click the file or directory whose trustee you want to remove.
2 Click Properties.
3 Click the OES Rights tab.
4 In the Trustees list, select the trustee you want to remove.
5 Click Remove, then click OK.
For example, Kim is a trustee of FILEA and FILEB. Kim has Read, File Scan, and Access Control
rights for FILEA and Read and File Scan rights for FILEB. Nancy has Read and File Scan rights for
FILEA.
If you give a new user named Michael the Read, Write, and File Scan rights for both FILEA and
FILEB and, at the same time, you want to give similar trustee rights to Kim and Nancy, you would
select Combine Multiple Trustees. The following would then be true:
Kim has Read and File Scan rights to both FILEA and FILEB. Her Access Control right is lost
because the combined rights are based on the rights given to Michael.
Nancy has Read and File Scan rights to both FILEA and FILEB. She has gained Read and File
Scan rights to FILEB because the combined rights are based on the rights given to Michael.
Michael has Read, Write, and File Scan rights to both FILEA and FILEB.
1 In Windows Explorer, select all the files or directories that you want to combine rights for.
2 Right-click the files or directories, then click Properties.
Starting with NetWare 6.5 and eDirectory 8.7.3, Client provides password management tools that
help administrators secure the network with stronger passwords and reduce password management
by enabling end users to manage their own passwords. This set of tools is referred to as Universal
Password.
With Universal Password, users can employ a single username and password to access networks,
applications, devices, Internet sites, online services, portals, and more. Administrators can reduce or
eliminate the task of resetting user passwords when they are forgotten or lost. Universal Password
also manages multiple types of password authentication methods from disparate systems and
provides extended password management capabilities. Universal Password is made possible by
Novell Modular Authentication Services (NMAS), an advanced authentication technology that allows
for multiple methods of authentication, including simple passwords, smart cards, biometrics, tokens,
and digital certificates.
Universal Password uses eDirectory plus NMAS to create a password that is used for access to all
resources. This common password type—taking the place of the combination of simple passwords,
NDS passwords, and enhanced passwords in eDirectory—allows for the enforcement of strong
password policies, such as minimum or maximum number of characters, a combination of alphabetic
and numeric characters, and forced password reset.
In addition, password policies let users set a hint for their passwords. If a password is entered
incorrectly or is forgotten, users can click the Password Help button and retrieve the hint they entered
to help them remember their password. This reduces administrator time spent resetting forgotten
passwords.
For more information on deploying universal passwords, see “Deploying Universal Password” (http://
www.novell.com/documentation/password_management31/pwm_administration/data/
allq21t.html#allq21t) and “Managing Passwords by Using Password Policies” (http://www.novell.com/
documentation/password_management31/pwm_administration/data/ampxjj0.html#ampxjj0) in the
Novell Password Management Administration Guide. It is important that you understand the
requirements for using these advanced password policies before rolling out any password changes to
your network.
The Client for Open Enterprise Server takes advantage of several of the features provided in
Universal Password, including the following:
Managing Passwords 79
using Novell iManager automatically sets the Universal Password to be synchronized to simple and
NDS password values for backwards compatibility. The NMAS task in iManager allows for granular
management of individual passwords and authentication methods that are installed and configured in
the system.
For more information on setting up password policies in iManager, see “Managing Passwords by
Using Password Policies” (http://www.novell.com/documentation/password_management31/
pwm_administration/data/ampxjj0.html#ampxjj0) in the Novell Password Management Administration
Guide. Make sure that you read this documentation and understand the requirements before rolling
out any password changes to your network.
Then, use the Password Policy Wizard in iManager to set up the policies.
1 Make sure you have completed the steps in “Prerequisite Tasks for Using Password Policies”
(http://www.novell.com/documentation/password_management31/pwm_administration/data/
bo59drg.html#bo59drg) in the Novell Password Management Administration Guide. These steps
prepare you to use all the features of password policies.
2 In iManager, make sure you are in the Roles and Tasks view by clicking on the top button bar,
then select Passwords > Password Policies in the navigation panel on the left.
3 Click New to create a new Password policy.
4 Follow the steps in the wizard to create Advanced Password Rules, Universal Password
Configuration Options, and Forgotten Password selections for the policy.
For information about each step, see the online help as well as the information in “Managing
Passwords by Using Password Policies” (http://www.novell.com/documentation/
password_management31/pwm_administration/data/ampxjj0.html#ampxjj0) in the Novell Password
Management Administration Guide.
80 Managing Passwords
Figure 6-2 Change Expired Password Dialog Box
The following is an example of the password criteria displayed when you click the Password Policy
button in the Change Password dialog box.
Figure 6-3 Password Policy
Managing Passwords 81
IMPORTANT: Before using Password Self-Service, review the information about “Managing
Passwords by Using Password Policies” (http://www.novell.com/documentation/
password_management31/pwm_administration/data/ampxjj0.html#ampxjj0) in the Novell Password
Management Administration Guide.
Other applications that use the Universal Password might be able to use additional features, such as
Reset Self-Service and Challenge Sets.
NOTE: The Client does not support forgotten actions that involve e-mailing the password or the
hint to the user.
NOTE: The Client prompts users to populate the Challenge/Response set if they log in and the sets
have not been entered.
The workstation administrator can choose to display or not display the Did you forget your
password? link on the Login dialog box.
Before the Did you forget your password? link can work, you must complete the following:
82 Managing Passwords
If you click the link before Password Self-Service is set up, you receive an error. If the administrator
changed or set up a new policy, you are prompted on log in.
IMPORTANT: Not all features of Forgotten Password Self-Service are implemented with the Client at
this time, including e-mailing passwords and hints.
Right-click the Client Tray icon ( ), then click User Administration > Challenge/Response
Administration. Depending on how the administrator configured the challenge sets, users enter
their information in the dialog boxes presented. For example, if the administrator specifies four
questions in the challenge set, users enter information in four different dialog boxes.
Figure 6-5 Sample Challenge/Response Dialog Box
If the administrator selected the Force user to configure Challenge Questions and/or Hint upon
authentication option on the Forgotten Password page in iManager, the client prompts users to
enter this information when they log in and their challenge set information is missing or out of
date.
Managing Passwords 83
Figure 6-6 Forgotten Password Page in iManager
The challenge/response questions allow for any response, such as a word, a sentence, or a phrase.
Because it might be difficult to correctly type a phrase or sentence when the text is hidden, answers
are not hidden with asterisks by default, like passwords usually are. However, as an added layer of
security, you can configure the challenge/response LCM to hide the user’s responses to the
challenge questions. For example, when this functionality is enabled, instead of the user’s response
reading “my son charlie” in plain text, the response reads “** *** *******.”
84 Managing Passwords
To configure the challenge/response LCM to hide the user’s responses to the challenge questions:
If a user forgets the answers to his or her challenge/response questions, the Client does provide a
way to reset the answers. Right-click , then click User Administration for > Challenge/Response
Administration. The user can then enter new responses in the dialog boxes presented.
If a user clicks the Did you forget your password? link in the Login dialog box, the user is asked to
answer their challenge questions. When the series of challenge questions is answered correctly, a
dialog box containing the password hint is displayed.
Figure 6-8 Forgotten Password Hint Dialog Box
If a user enters an erroneous password, the login program displays a message with a prompt to
retype the password or click the Did you forget your password? link.
Managing Passwords 85
Figure 6-9 Password Error Dialog Box
If the policy action is to show a hint but the user did not enter a hint for the current password, an error
message is displayed telling the user to contact the system administrator to reset the password and
to enter a hint the next time the password is set.
Figure 6-10 Forgotten Password Error Dialog Box
Users can also create a hint at any time using the Change Password window available at login, or by
pressing Ctrl+Alt+Delete, then clicking Change Password.
Figure 6-11 Change Password Dialog Box
86 Managing Passwords
6.4 Setting Up Passwords in Windows
We recommend that you configure workstations to not use any of the Microsoft password restrictions
available in User Manager. The Client works best if password restrictions are set in eDirectory.
Managing Passwords 87
88 Managing Passwords
7 Security Considerations
7
Users are authenticated Yes GUI and command line login utilities support
authentication of NCP and LDAP connections
via user authentication into eDirectory. NCP
protocol authentication is supported via RSA,
and LDAP authentication is supported via SSL
and the Simple Bind protocol.
Servers, devices, and/or services are Yes Connections to servers are authenticated via
authenticated user-supplied credentials. No device
authentication is supported directly by the
Client.
Data on the wire is encrypted by default No No wire encryption is supplied by this product.
Passwords, keys, and any other Yes Passwords and other authentication materials
authentication materials are stored in temporary storage are encrypted to prevent
encrypted in-memory scanners.
FIPS 140-2 compliant Unknown MSCAPI is not a FIPS 140-2 certified API, but
this is deemed unimportant because
customers have not expressed a requirement
for FIPS 140 compliance.
Security Considerations 89
7.2 Known Security Threats
The following section provides a list of known security threats for the Client, an indication of how
difficult it would be to exploit the threat, and what the consequences would be for a customer.
Attempted access out-of-hours or Date/Time and Location restrictions at login Medium Easy
from unauthorized locations
Wire frame examination and Same protections as with other Novell Low Hard
manipulation products utilizing NCP and RSA-based
authentication
Memory scanning for sensitive data All buffers containing sensitive data Low Hard
(passwords) are short-term in nature and are
zeroed and/or freed immediately after use.
This product does not itself authenticate to another product, system, or service. No portion of this
product authenticates to another.
90 Security Considerations
7.3.2 Authorization and Access Control
This product allows the protections supplied by eDirectory for access control to be fully realized for
those resources that are contained within eDirectory. Access to resources is protected based on user
identity (as stored within eDirectory). The VFS, daemon, and X-Tier work together to compare ACLs
for a given file system path or object retrieved from eDirectory to the identity and session scope
established for the identity that owns a given connection.
The VFS acts as a proxy to the local file system (via redirection of its local mount point) to make such
decisions for network-based file system paths or objects.
7.3.3 Roles
This product does not define or manage roles. It simply makes use of roles that have already been
defined elsewhere and treats role access privileges in the same way as any user identity.
Because the product has a VFS module running in the kernel, it does not require root access for
users to create mount points (as do NCPFS and other similar open source offerings to date). The
product does not require use of SETUID for any of its operations.
Security Considerations 91
92 Security Considerations
8 Managing Login
8
You can customize the Client login environment to suit your network and have greater control over
what users can access during login.
For more information on setting up login scripts, see the Novell Login Scripts Guide (http://
www.novell.com/documentation/linux_client/login/data/front.html).
Requiring a password. You can specify its minimum length, whether it must be changed and how
often, whether it must be unique, and whether the user can change it. You can also require
strong passwords. See Chapter 6, “Managing Passwords,” on page 79.
Setting the number of logins with an expired password and the number of incorrect login
attempts allowed.
Setting account limits such as an account balance or expiration date.
Managing Login 93
Limiting disk space for each user by specifying the maximum blocks available for each user on a
volume.
Specifying the number of simultaneous connections a user can have.
Specifying (by node address) which workstations users can log in on.
Restricting the times when users can log in (you can assign all users the same hours, or you can
restrict users individually).
When a user violates login restrictions by entering an incorrect password or by exceeding the number
of logins with an expired password, the account is disabled and no one can log in using that
username. This prevents unauthorized users from logging in.
1 Launch iManager by entering the following in the Address field of a network browser:
http://server_IP_address/iManager.html
2 Log in using your username and password.
You will have access only to those features you have rights to. To have full access to all Novell
iManager features, you must log in as Supervisor/Administrator of the tree.
3 Make sure you are in the Roles and Tasks view by clicking on the top button bar, then select
Users > Modify User in the navigation panel on the left.
4 Type the name and context of the User object you want to modify, or use the search feature to
find it, then click OK.
5 Click the Restrictions tab (or drop-down list, depending on the browser you are using).
94 Managing Login
The following options appear. They open pages that display various properties:
Password Restrictions
Login Restrictions
Time Restrictions
Address Restrictions
Account Balance
Intruder Lockout
6 Make your changes, then click Apply to preview or OK to save.
NMAS authentication
NMAS authentication adds additional security to the network. However, if your network does not
use NMAS, login might take additional time and you might want to disable NMAS authentication.
Managing Login 95
For more information, see “Disabling NMAS on the Server” in the Novell Modular Authentication
Services 3.0 Administration Guide (http://www.novell.com/documentation/nmas30/
index.html?page=/documentation/nmas30/admin/data/am4bbpx.html).
IMPORTANT: You can use the Install.ini file to control the installation of NMAS. In the
[Setup] section of the Install.ini file, there are InstallNICI and InstallNMAS options. If
you change these options to No (they are set to Yes by default), NICI and NMAS are not installed
when you install the Client. See Section 2.3, “Using the Install.ini File,” on page 24 for more
information.
NOTE: The Clear current connections option is never visible during initial login, because
an initial login automatically clears all connections.
Context field
If the Login dialog box is being used to log in to a specific tree, you can disable the Context
field to prevent users from changing the context.
Contexts browse button
If the Login dialog box is being used to log in to a specific tree, you can disable the Contexts
browse button to prevent users from changing the context.
Did you forget your password? prompt
This prompt gives users the ability to recover from a forgotten password without contacting
the help desk. See Section 6.3, “Using Forgotten Password Self-Service,” on page 81 for
more information on configuring the Forgotten Password feature.
Last logged on user
You can specify whether the last logged on user is displayed along with the Logon when a
user logs on to a computer.
Login Profile drop-down list at the top of the dialog box
The Login Profile drop-down list can be set to Off (always hide the Login Profile list), On
(always display the Login Profile list) or Automatic (only display the Login Profile list if it
contains more than one Login Profile).
Tree field
If the Login dialog box is being used to log in to a specific tree, you can disable the Tree field
to prevent users from changing the tree.
Trees browse button
If the Login dialog box is being used to log in to a specific tree, you can disable the Trees
browse button to prevent the user from changing the tree.
96 Managing Login
Variables button on the Script tabbed page
If you use %2, %3, %4, or %5 in the login script, you might want to set these values in the
location profile but not allow users to change them. In this case, it might be helpful to hide
the Variables button.
1 Right-click the Client Tray icon ( ) in the notification area of the taskbar, then click Client
Properties.
2 Click Advanced Login.
3 Select Show on Login in the Parameter groups drop-down list.
4 Select the parameter you want, then select On or Off in the Setting drop-down list.
A short description of each parameter is available in the Description field when you select the
parameter. For more information, see Section 4.2.3, “Advanced Login Settings,” on page 57.
5 Click OK.
The Workstation Only If Not Connected option in the Novell Client for Windows XP/2003 functioned
purely on "Does Windows know of one or more active network interfaces?" to decide whether or not
to automatically select the Workstation Only login option. While this approach was useful in many
cases, scenarios where the workstation was still connected to a network over which the eDirectory
servers were not accessible (such as a home broadband network) could prevent the feature from
engaging. The fact this feature decided to enable or disable the Workstation Only option before any
Managing Login 97
logon attempt occurred could also be a limitation, if Windows was still in the process of starting up
and more Windows network interfaces arrived after Workstation Only if Not Connected had already
made its decision.
The Client for Windows Computer Only Logon If Not Connected feature, when enabled, improves
upon both of these points. Instead of any Windows network interface, it is now possible to specify
specific Windows network categories (for example, Work, Home, and Public) for which a Computer
Only Logon is preferred. Additionally, specific names assigned to Windows networks (for example,
Network 1, Network 2, My Office, and so on) can be specified for more granular control.
Finally, the Computer Only Logon If Not Connected feature does not make its decision about
whether to proceed with a Logon or automatically switch to Computer Only Logon until the user
actually initiates a logon attempt. Thereby permitting the maximum time possible for additional
network interfaces to arrive or be detected before the feature makes its decision.
The Computer Only Logon If Not Connected feature, when enabled, also maintains the basic "if no
Windows network interfaces are available, perform a Computer Only Logon instead of Logon"
functionality. This functionality can be used even without having to specify any Windows network
names or categories.
At the next available opportunity, the Client will add configuration of the Computer Only Logon If Not
Connected feature into the Client Properties configuration interface. Until then, this feature can be
enabled by directly editing the described registry configuration.
Section 8.4.1, “Enabling the Computer Only Logon If Not Connected Feature,” on page 98
Section 8.4.2, “Using the Computer Only Logon If Not Connected Feature,” on page 99
98 Managing Login
which CAN NOT access eDirectory servers, and if all connected networks match this criteria
the Client should skip the eDirectory login attempt and proceed immediately with a
Computer Only Logon instead. Continue reading the description below of the Network
Category List and Network Name List values for additional explanation.
The Computer Only Logon If Not Connected feature takes effect when the Enable value is set to 1,
even if the Network Category List or Network Name List values are not defined. When the Computer
Only Logon If Not Connected feature is enabled, at minimum the Client will automatically perform a
Computer Only Logon instead of a Logon if Windows reports there are not any active network
interfaces when the logon attempt is initiated.
If the Network Category List is defined, the Client will query Windows to determine what category
each identified network belongs to (Work, Home, or Public). When the Use Lists for Novell Logon
value does not exist or is set to 0 (zero), the Network Category List names which Windows network
categories the Computer Only Logon If Not Connected feature should assume CAN NOT access
eDirectory servers, and assumes any non-matching connected networks CAN access eDirectory
servers. When the Use Lists for Novell Logon value is set to 1, the Network Category List names
which Windows network categories the Computer Only Logon If Not Connected feature should
assume CAN access eDirectory servers, and assumes any non-matching connected networks CAN
NOT access eDirectory servers.
If the Network Name List is defined, the Client first performs the Network Category List processing
described above if the Network Category List is defined. After matching the active network
categories against the Network Category List, the Client will additionally match the network names
against the Network Category List. When the Use Lists for Novell Logon value does not exist or is
set to 0 (zero), the Network Category List names individual Windows networks the Computer Only
Logon If Not Connected feature should assume CAN NOT access eDirectory servers, regardless of
what Windows network category the named networks belong to. When the Use Lists for Novell
Logon value is set to 1, the Network Category List names individual Windows networks
the Computer Only Logon If Not Connected feature should assume CAN access eDirectory servers,
regardless of what Windows network category the named networks belong to.
After completing both the Network Category List processing (if defined) and the Network Name List
processing (if defined), and after considering the meaning of those lists in relation to the Use Lists for
Novell Logon value (if defined), if the Computer Only Logon If Not Connected feature has ultimately
determined there is ONE OR MORE connected networks which CAN access eDirectory servers, a
Logon attempt will be permitted to proceed normally and attempt an eDirectory login. If the Computer
Only Logon If Not Connected feature ultimately determined that ALL of the connected networks CAN
NOT access eDirectory servers, a Logon attempt will skip the eDirectory login attempt and proceed
immediately with a Computer Only Logon instead.
For example, assume the Network Category List has been configured with Home and Public, and the
Network Name List has been configured with RemoteOffice, and the Use Lists for Novell Logon
value does not exist or is set to 0 (zero). During the next logon attempt, Windows reports a Public
network and also a Work network named RemoteOffice. Even though based on the Network
Category List alone a Logon would have been permitted to attempt eDirectory login due to presence
of the Work category network, because the Work network is named RemoteOffice and this network
name appears in the Network Name List, the Client will actually consider that none of the active
networks detected by Windows can access eDirectory servers. Attempting a Logon would result in
the Client skipping the eDirectory login attempt and would proceed with a Computer Only Logon
instead.
Managing Login 99
2. Select the Logon link on the Windows logon page, if the Client login is not already in Logon
mode. If Computer Only Logon mode is explicitly selected, the Computer Only Logon If Not
Connected feature does not need to engage.
NOTE: By default, the Client remembers whether Logon or Computer Only Logon was last
used, and will default to that mode during the next logon. If you want the Client to always come
up in Logon mode and then just let the Computer Only Logon If Not Connected automatically
decide whether a Logon attempt is actually appropriate, change the Computer Only Logon
Default setting from Automatic to Never in the Advanced Login tab of the Client Properties.
3. Now attempt to logon in Logon mode. Once you enter your password and click Submit, the
Client will begin the Computer Only Logon If Not Connected processing of querying Windows
for connected network names and categories, and matching those names and categories again
any configured Network Category List and Network Name List values.
4. If the Client determines there are one or more active Windows networks present over which a
Logon attempt will be appropriate, the Client will simply proceed with normal Logon processing
of attempting to login to both eDirectory and the Windows account.
5. If the Client determines that all of the active Windows networks match criteria indicating that
cannot access eDirectory servers, or if Windows reports there simply are not any active
Windows networks, even though the Client was in Logon mode when the logon attempt was
initiated, the eDirectory login will be transparently skipped, and only the Windows account logon
attempt will be made.
6. Note in cases where the Windows account password is not the same as the eDirectory account
password – for example, because the Windows account password was normally supplied from a
Novell ZENworks Dynamic Local User (DLU) policy, or the password was expected to be
retrieved by NMAS-based Single Sign-On – the Windows-only account logon attempted by
Computer Only Logon If Not Connected will not be able to succeed using the eDirectory
password.
In this case, the Client will still skip the eDirectory logon attempt and will perform just a Computer
Only Logon, but the user will have to manually enter their Windows account password. This is
only an issue in cases which otherwise would have retrieved their Windows account passed from
eDirectory-based sources.
Right-click the Client Tray icon ( ) in the notification area of the taskbar, then click OES Login.
In the Network folder, double-click the desired tree or server.
In the Network folder, right-click the desired tree or server, then click Open.
Run loginw32.exe from the command prompt.
This file is located in the C:\Windows\System32 folder.
Include loginw32.exe in the Windows startup folder.
This causes the Client Login to run automatically at workstation startup and shows the Login
screen when Windows first opens.
If you want to log out of both the Windows workstation and server, press Ctrl+Alt+Del and then click
Logoff.
To log out of a specific server, right-click the Network folder, click NetWare Connections, select the
server or tree, then click Detach. Or, right-click the Client Tray menu, click OES Connections, select
the server or tree, and then click Detach.
Login profiles are especially useful for users who log in from multiple places. Users can have
separate profiles for the office, home, laptop, or any other workstation they use. This simplifies the
login process so that users don’t need to remember their login information for each workstation.
Using multiple login profiles also gives you control over what users can access from each
workstation.
The Client also supports "user login profiles", which can be created and managed by the user. In
many cases, a user login profile is created automatically for the user in response to the Save profile
after successful login setting in a system login profile. The user can also directly create and edit their
user login profiles from the Login Profile Administration option in the Client Tray menu. For more
information, see “Managing Your Login Profiles” in the Client for Open Enterprise Server User Guide.
When a login profile exists both as a system login profile and also as a user login profile, the user
login profile takes precedence so that any user-specific details necessary for the user to successfully
login will be used. For example, the administrator may have created a system login profile named
"Default" that specifies the eDirectory tree name and a specific default eDirectory context. But the
user may need to specify a more specific eDirectory context in order to successfully log on to
eDirectory, different from the eDirectory context that the administrator specified in the system login
profile.
The user's eDirectory context selection will be saved as part of a user login profile named "Default".
Such that now a user login profile named "Default" exists for this user, in addition to the system login
profile named "Default" created by the administrator. As the user login profile takes precedence,
during future Client logins the eDirectory context and other login defaults will be correctly
remembered for the user. As the user login profiles specific to this user, it will be loaded as soon as
their username is entered into the "Username" field of the Client login.
You can edit system profiles (and only system profiles) on the System Login Profiles tab in the Client
Properties dialog box (right-click the Client Tray icon in the notification area of the taskbar, click Client
Properties, then click the System Login Profiles tab).
When you edit user profiles (right-click the Client Tray icon in the notification area of the taskbar, click
User Administration for, then click Login Profile Administration), you will see both system profiles
and user profiles in the list of profiles. Whether a profile name listed in the Login Profile Administration
list happens to be a system login profile or user login profile should not be important. Both the Login
Profile Administration list and the “Login Profile” selection list (if any) on the Client login dialog simply
intends to present the list of selectable login profile names, regardless of whether they happen to be
system login profiles or user login profiles.
You can initiate editing any profile presented in the Login Profile Administration list regardless of
whether it happens to be a system login profile or a user login profile. Editing a user login profile will
modify the profile directly, whereas if the profile selected for editing happens to be a system profile,
any changes made during editing will be saved as a user login profile.
By default the Client displays the Login Profile list "automatically", which means that the Login Profile
list is automatically enabled whenever there is more than one login profile the user might potentially
be able to choose. If there is only one login profile available, then the Login Profile list will not be
shown since no alternate login profile selection can be made.
Figure 8-3 Login Dialog Box with the “office” Login Profile Selected
For information on creating and editing user login profiles, see “Managing Your Login Profiles” in the
Client for Open Enterprise Server User Guide.
3 Type the name of the profile you want to add in the New System Login Profile text box, then click
Add.
You can give a system login profile the same name as a user login profile, but be aware that
during login if a user already has a user login profile with the name, the user login profile will be
used because user profiles always supersede system profiles when they have the same name.
4 In the Login dialog box, specify the login information you want for this profile, such as a tree,
context, and server.
To create a system login profile that can be distributed by the Client Install Manager:
1 Start the Client Install Manager (nciman.exe), located in the C:\Micro Focus\Client for
Open Enterprise Server 2 SP4 (IR3)\Admin folder.
2 In the Client for Windows Properties box, double-click Client to open the Client for Windows
Properties dialog box, then click the System Login Profiles tabbed page.
5 Click OK to close the Login dialog box, then click OK to close the Client Properties dialog box.
A parameter for the login profile you just created appears in the Parameter list in the Client Install
Manager.
WARNING: If you right-click the login profile parameter and select Clear List and
Distribute(Never), the login profile you just created is deleted.
This file can be specified as input to ACU, the Update Agent, or setup.exe during the next Client
installation/upgrade. For more information on distribution methods, see Chapter 2, “Advanced
Installation Options,” on page 19.
You can easily configure OES DHCP servers (NetWare 5 and later) to distribute this information to
the clients. For more information, see the Novell DNS/DHCP Administration Guide for Linux (http://
www.novell.com/documentation/oes2/ntwk_dnsdhcp_lx/?page=/documentation/oes2/
ntwk_dnsdhcp_lx/data/bookinfo.html#bookinfo) or the Novell DNS/DHCP Administration Guide for
NetWare (http://www.novell.com/documentation/oes/dhcp_enu/data/front.html).
Clients obtain configuration information from DHCP even when you statically configure the clients' IP
addresses or when the DHCP server used to supply the information is different from the DHCP server
supplying an IP address to the clients.
Unlike the Novell Client for Windows XP/2003, the use of information from DHCP options 85, 86, and
87 is not enabled through a DHCP Settings tab in the Client Properties dialog box. Using information
from DHCP in the Client is enabled directly from the Tree:, Context:, and Server: fields in the login
profile. You can enable use of DHCP information when creating a new profile or when editing an
existing profile.
NOTE: Users can create their own DHCP profiles by using the Login Profile Administration
option on the Client Tray menu. See “Enabling the Use of DHCP In a Personal Login Profile” in
the Client for Windows User Guide for more information.
3 Type the name of the profile you want to add (for example, Corporate) in the New System Login
Profile text box, then click Add.
4 In the fields you want to be filled by DHCP, select <DHCP> from the drop-down menu.
NOTE: When using the login profile to perform a login, users can overwrite the values displayed by
DHCP, but the changes are in effect only for that specific login. If <DHCP> is chosen as an option in a
login profile for Tree, Context, or Server, it cannot be removed by simply editing the field when logging
in or by saving the profile on successful login. Any values entered in these fields during login are not
The Lightweight Directory Access Protocol (LDAP) is an Internet communications protocol that lets
client applications access directory information. It is based on the X.500 Directory Access Protocol
(DAP) but is less complex than a traditional client and can be used with any other directory service
that follows the X.500 standard. Lightweight Directory Access Protocol (LDAP) Services for
eDirectory is a server application that lets LDAP clients access information stored in eDirectory.
If your network has LDAP Services for eDirectory set up on your eDirectory tree and you are running
eDirectory 8.5 or later, users who are logging in to the network from Windows can log in to the
network without entering their context in the Login dialog box. To log in, users need to know only their
username, password, and the name of the tree that is running LDAP Services. Optionally, you can
also have users log in to the network without specifying the eDirectory tree name.
Generally, when a user connects to the network using LDAP, the connection is made through an
LDAP client. Now, the Client Login acts as an LDAP client and connects to the network. All LDAP
clients bind (connect) to eDirectory as one of the following types of users:
NOTE: The NDS User Bind is not used by LDAP Contextless Login.
The type of bind and the rights assigned to the corresponding User object determine the content that
the LDAP client can access. LDAP clients access a directory by building a request and sending it to
the directory. When an LDAP client sends a request through LDAP Services for eDirectory, eDirectory
completes the request for only those attributes that the LDAP client has the appropriate access rights
to. There are additional restrictions that can be set to further secure connections.
This documentation assumes that you are familiar with LDAP. It contains links to information about
LDAP and eDirectory; it is not meant to replace or supersede the documentation about LDAP running
on eDirectory. If you are unfamiliar with LDAP, you should familiarize yourself with LDAP and how it
operates in your network.
Before users can log in to the network without their context or tree information, you must complete the
following steps:
If you experience problems with LDAP Contextless Login, check the Server and Group object
configurations. Most problems occur in the access rights given to the Proxy User. You can use any
LDAP browser available from the Internet to check the access rights. Browse to the user and verify
that you can read the inetOrgPerson property and other properties you are searching for, such as CN
and MAIL. If these cannot be seen through the LDAP browser by logging in anonymously, contextless
login cannot perform the proper searches to resolve the User object’s context in the tree.
1 Install and configure the LDAP Services for eDirectory on the LDAP server.
See “Understanding LDAP Services for eDirectory” (https://www.netiq.com/documentation/
edir88/edir88/data/a4wyf4a.html) and “Configuring LDAP Services for eDirectory” (https://
www.netiq.com/documentation/edir88/edir88/data/ahlmb7h.html) in the eDirectory 8.8
Administration Guide.
2 Do one of the following:
Grant the Read right to the Public Object. See “Connecting As a [Public] User” on page 112.
Create a Proxy User Object that has the correct rights. See “Connecting As a Proxy User”
on page 112.
User [Public] is a nonauthenticated eDirectory user. By default, user [Public] is assigned the Browse
right to the objects in the eDirectory tree. The default Browse right for user [Public] allows users to
browse eDirectory objects but blocks user access to the majority of object attributes.
The default [Public] rights are typically too limited for most LDAP clients. Although you can change
the [Public] rights, changing them gives these rights to all users. Because of this, we recommend that
you use the Proxy User Anonymous Bind. For more information, see “Connecting As a Proxy User”
on page 112.
To give user [Public] access to object attributes, you must do the following in iManager:
All LDAP client access through anonymous binds is assigned through the Proxy User object.
The Proxy User must have a null password and must not have any password restrictions (such
as password change intervals). Do not force the password to expire or allow the Proxy User to
change passwords.
You can limit the locations that the Proxy User can log in from by setting address restrictions for
the Proxy User object.
The Proxy User object must be created in eDirectory and assigned rights to the eDirectory
objects you want to publish. The default user rights provide Read access to a limited set of
objects and attributes. Assign the Proxy User Read and Search rights to all objects and
attributes in each subtree where access is needed.
The Proxy User object must be enabled on the General page of the LDAP Group object that
configures LDAP Services for eDirectory. Because of this, there is only one Proxy User object for
all servers in an LDAP group.
You can grant a Proxy User object rights to All Properties (default) or Selected Properties. In
order for contextless login or treeless login to work, the Read right must be granted so that LDAP
can search the container or tree for the User object. Typically, you assign the Proxy user rights to
the root of the tree so that LDAP can view the attributes of the User objects throughout the tree.
However, you might want to restrict access by assigning the Read right only to individual
Organizational Units that you want LDAP to search.
NOTE: LDAP Contextless Login requires clear text passwords to be enabled for LDAP. This does not
affect the eDirectory password required during Login. They remain encrypted.
To give the Proxy User rights to only selected properties on eDirectory 8.7 or later, complete the
following steps:
NOTE: LDAP Contextless Login works with eDirectory 8.5 or later. However, these steps apply
specifically to eDirectory 8.7. If you are using a compatible version other than eDirectory 8.7, check
the documentation that corresponds to your version for steps.
1 Launch iManager by entering the following in the Address field of a network browser:
http://server_IP_address/iManager.html
2 Log in using your username and password.
You have access only to those features you have rights to. To have full access to all Novell
iManager features, you must log in as Supervisor/Administrator of the tree.
3 Make sure you are in the Roles and Tasks view by clicking on the top button bar, then select
Rights > Modify Trustees in the navigation panel on the left.
4 Specify the top container the Proxy User is to have rights over or click the Browse button to
browse to the container in question, then click OK.
5 On the Modify Trustees page, click Add Trustee.
6 Browse to and click the Proxy User’s object, then click OK.
7 On the Modify Trustees page, click Assigned Rights for the Proxy User.
8 Select the All Attributes Rights and Entry Rights options, then click Delete Property.
9 Click Add Property, then select the Show All Properties in Schema option.
10 Select an inheritable right for the Proxy User, such as mailstop (in the lowercase section of the
list) or Title, then click OK.
To add additional inheritable rights, repeat Step 9 and Step 10.
11 Click Done.
To implement proxy user anonymous binds on eDirectory 8.7 or later, you must create the Proxy User
object in eDirectory and assign the appropriate rights to that user. Assign the Proxy User Read and
Browse rights to all objects and attributes in each subtree where access is needed. You also need to
enable the Proxy User in LDAP Services for eDirectory by specifying the same proxy username.
1 Launch iManager by entering the following in the Address field of a network browser:
http://server_IP_address/iManager.html
2 Log in using your username and password.
You have access only to those features you have rights to. To have full access to all Novell
iManager features, you must log in as Supervisor/Administrator of the tree.
3 Make sure you are in the Roles and Tasks view by clicking on the top button bar, then select
LDAP > LDAP Options in the navigation panel on the left.
4 On the LDAP Options page, click the name of an LDAP Group object to configure.
If you want to install on a few workstations, complete these steps. If you want to install on many
workstations, see “Setting Up LDAP Contextless Login on Multiple Workstations” on page 116.
1 At the user’s workstation, right-click the Client Tray icon ( ) in the notification area of the
taskbar, then click Client Properties.
2 Click the LDAP Contextless Login tab.
TIP: The LDAP property page does not ensure that this context is correct. If users have
problems logging in, check that you typed this information correctly.
8e (Optional) Add multiple contexts to be searched by repeating Step 8d for each context.
The servers and contexts are searched in order. You can set the order they are searched by
selecting a server or context, then clicking Up or Down to move its position in the search list.
9 Click OK.
10 (Optional) Specify additional eDirectory trees to use by repeating Step 4 through Step 9 for each
tree.
11 (Optional) Set the optional search and display parameters that LDAP Contextless login uses to
search the eDirectory tree for users by clicking Settings.
For example, because users do not need to specify their context, you might want to disable the
Display Context parameter so that the context is not displayed during login.
The Client login dialog, on the eDirectory tab shown in the Show Advanced Options or Advanced
section, will display status text to confirm whether the eDirectory tree name currently entered in the
Tree field does or does not qualify as a tree for which LDAP Contextless Login will be attempted,
based on the current LDAP Contextless Login configuration. This status text is only shown when the
LDAP Contextless Login feature of the Client has been enabled, either in a treeless or tree-specific
mode.
When invoking Show Advanced Options from the credential provider (the login dialog box seen
at boot time and when logging out of Windows), the LDAP Contextless Login lookup cannot be
triggered when viewing the eDirectory tab. If LDAP Contextless Login is enabled, a lookup is
performed after the user attempts to log in to eDirectory from the credential provider.
This is different from the LDAP Contextless Login behavior when running LOGINW32.EXE or
selecting the Login option from the Client Tray menu on the desktop. In those instances, you can
see the effect of the LDAP Contextless Login lookup prior to actually proceeding with the
eDirectory login.
The options to search by attributes other than username (for example, phone number or e-mail
address) have been disabled for the Client for Open Enterprise Server release.
Wildcard based search is disabled in Client for Open Enterprise.
When 802.1X authentication is enabled, the username and password entered in the Login dialog box
are first passed to the EAP plug-in module. An exchange of messages (PEAP/MSCHAPv2) between
the Windows supplicant, the wireless access point/wired switch, and the RADIUS server allows
network access if the correct credentials were entered. After the 802.1X authentication has
succeeded, both the eDirectory and local logins take place just as they have in previous versions of
the Clients. If the 802.1X authentication fails, no access to the network is given, and the user will not
be able to access the network.
The 802.1x authentication feature supports both wired and wireless connections. Only password-
based authentication is supported (the Client supports only PEAP with MSCHAPv2). Biometrics (non
password-based) authentication types are not supported with this release. If you want certificate
support, the Microsoft EAP plug-ins are sufficient and no Client-specific EAP support is required.
The ability to browse for trees and servers in the Login dialog box is not supported because the
802.1X port blocks all network access.
TIP: We recommend testing this functionality with user accounts that don't expire. There is a
possibility that grace login messages won't display to users, which means that users might
unknowingly exhaust their grace logins.
This configuration is intended for use only with the native 802.1x supplicant provided with Windows.
We recommend that you install only the driver for your wireless adapter (that is, that you do not install
other supplicants or utilities that come with wireless adapters). This is because such utilities often
disable the wireless service in Windows. You should also make sure that the Use Windows to
configure your wireless network setting is always enabled (to do this, right-click the wireless
connection).
1 Click the Start button in the lower left corner of the Windows desktop, then click Control Panel.
2 Click System and Maintenance, click Administrative Tools, then double-click Services.
3 In the list of services, double-click Wired AutoConfig.
4 From the Startup type drop-down list, select Automatic.
1 Click the Start button, then type regedit.exe in the Start Search field.
2 Press Enter to open the Registry Editor.
3 Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Winlogon, then modify or add the following parameters:
NOTE
If you do not specify a domain name, Client attempts to log on to the Local Machine.
Manually writing DefaultPassword key into the registry makes it visible to all users who have
registry access.
NOTE:
If either DefaultLoginProfile or AutoAdminDefaultLoginProfie is not provided, the Default
profile for the eDirectory username is used for the eDirectory AutoAdminLogon.
If the Windows password is the same as the eDirectory password, the last value is not
necessary. In the future, a way to securely store the eDirectory password might be provided.
Once Windows AutoAdminlogon is configured, it will work with or without having the
eDirectory AutoAdminLogon configured or enabled.
eDirectory AutoAdminLogon, even if configured, will work only if Windows AutoAdminlogon
is configured and enabled.
When the Client is installed, by default this behavior is unchanged. Correct Windows credentials
passed from the terminal client workstation still result in a Windows-only account logon within the
terminal session.
To enable the SSO feature, you must first enable the SSO functionality in the Client Properties. Once
enabled, SSO will be attempted during every login to both eDirectory and Windows. Note that the
Client SSO functionality is only available in cases where an eDirectory login is being performed in
addition to the Windows account login.
The SSO feature is provided through capabilities of the Novell NMAS client, and is only available
when the NMAS Client 3.5.0 or later is installed.
6 On the Log on to this Computer page, specify the Windows user credentials, then click the
icon.
NOTE: You can link any number of Windows users to a single eDirectory user.
Install IAS (Identity Assurance Client) 3.0.8. IAS installation triggers Novell Client 2 SP3 for
Windows (IR2a) and NESCM 3.0.8 (Novell Enhanced Smart Card Method) installation. For more
information on the IAS installation, see Novell Enhanced Smart Card Method Installation in the
Novell Enhanced Smart Card Method Installation and Administration Guide.
NOTE: NMAS Client 3.5.1 or later is required for NMAS Based Windows Logon to work. NMAS
Client 3.5.1 gets installed by default along with Novell Client 2 SP3 for Windows (IR2a).
Select the Use Smart Card for Workstation Only Login and Require Smart Card for Workstation
only Login check boxes as per the security requirement of the organization during the NESCM
installation. For more information, see Novell Enhanced Smart Card Method Installation in the
Novell Enhanced Smart Card Method Installation and Administration Guide.
Enroll the workstation users with the eDirectory user.
After enabling NMAS for Windows Logon feature, you can disable it for a specific workstation as well
as exempt some users from using it.
After a successful eDirectory plus workstation login (enrollment), the NMAS for Windows Logon
functionality encrypts and stores the credentials for future computer only logins. This means that a
successful enrollment must have occurred before NMAS for Windows Logon functionality is available.
Section 8.13.1, “Enrolling Users for “NMAS for Windows Logon”,” on page 130
Section 8.13.2, “Performing an NMAS Based Windows Logon,” on page 133
Section 8.13.3, “Creating an Exception List,” on page 134
Section 8.13.4, “Suppressing the NMAS Support for Computer Only Logon,” on page 135
5 On the NMAS tab, select the sequence as Enhanced Smart Card, then click Apply.
NOTE: You can also login using your password if Require Smart Card for Workstation Only
Login is not enabled at the time of IAS client installation. For more information, refer <IAS
Section>. Deselect the Use NMAS for Windows Logon check box for a Windows password
based login. It is recommended to remove the smart card from the smart card reader during this
login.
NOTE: The usernames can be in any of the following formats: simple user names such as john,
user names preceded by domain names (for example, domainname\john), and UPN format user
names such as [email protected].
Section 8.14.1, “Client Service Location Diagnostic Utility (SLPINFO),” on page 135
The SLPINFO output available in the Client for Open Enterprise Server is different from the SLPINFO
output presented by previous platforms such as the Novell Client for Windows XP/2003. Most of
these differences relate to the level of information that is available through existing standards-based
OpenSLP user agent APIs, versus the information which had been exposed by the proprietary
SRVLOC.SYS user agent used earlier Client platforms.
The intention of the SLPINFO tool remains unchanged, and that is to provide information which can
help verify or diagnose SLP-related behavior from the client machine's perspective. As improvements
are made to the OpenSLP user agent APIs, additional information can also be presented by the
Client for Windows SLPINFO utility.
The Client for Windows SLPINFO utility supports the following options:
/D - Displays the SLP Directory Agent (DA) resources and associated SLP scopes that can be
located in the environment via the Client Properties Service Location tab configuration, via
DHCP Inform options 78 and 79, and via multicast solicitation.
NOTE: This discovery is being performed using an instance of the OpenSLP user agent running
on the SLPINFO.EXE process itself, and is not the same OpenSLP user agent instance actually
being used by the Client for name resolution. As such it is possible that firewall policies or other
user program restrictions could prevent the SLPINFO utility from discovering some SLP DAs
which are actually available in the environment, even though these same SLP DAs actually can
be successfully discovered and used from the OpenSLP user agent instance running on the
Client XTSVCMGR service.
/T - Displays the eDirectory tree (ndap.novell) resources visible to the Client via SLP, as well as
their associated IPv4 addresses.
The Client for Open Enterprise Server Administration Guide has been updated as shown below.
May 2016
Section Change
All The guide is updated for rebranding changes. Novell Client is rebranded to
Client for Open Enterprise Server. This rebranding change do not cause
any impact on the product functionality.
September 30 2015
Section Change
January 30 2012
Section Change