CHAPTER 1: INTRODUCTION AUTHENTICATION OPERATIONS
24 8E6 TECHNOLOGIES, R3000 ENTERPRISE FILTER AUTHENTICATION USER GUIDE
tory server, the Novell eDirectory Agent can be used instead
to authenticate end users.
NOTE: See 8e6 Authenticator and Novell eDirectory Agent for
information on setting up these types of authentication on the
network.