Next: TELNETD and FTPD Up: Eagle User Authentication Previous: Gateway Group

Precedence of Rules in User Authentication

To determine whether to authenticate a user or which method to use, Eagle exercises these rules in the order shown until one is true:

  1. Use any method specified as a rule service limit with auth or do not authenticate users if noauth is specified. Refer to section for a description of these limits.
  2. If the connection is incoming and file /usr/ace/sdconf.c or /var/ace/sdconf.rec exists, use Secure ID.
  3. If the connection is incoming and file /usr/adm/sg/gwpasswd exists, use Gateway User Authentication.
  4. If the connection is outgoing and file /usr/adm/sg/gwpasswd exists, use Gateway User Authentication.
  5. If the connection is outgoing and file /usr/ace/sdconf.c or /var/ace/sdconf.rec exists, use Secure ID.
  6. Authorized telnet and ftp users can go in and out of the protected network without identifying themselves.


tkevans@delmarva.com