2.808 bytes |
Service Publications |
Document ID: GCOR-3G6GHN |
This document is provided to IBM and our Business Partners to help sell and/or service IBM products. It is not to be distributed beyond that audience or used for any other purpose. |
Using Network Security Program on AIX, OS/2, and DOS Platforms
Applicable to: World-Wide
Name & Size (bytes) |
Description |
WWW URL(s) |
TThis publication (Using Network Security Program on AIX, OS/2, and DOS Platforms) is now downloadable from the URL above. The file is in Adobe .PDF format, to view these files you will need a copy of Adobe Acrobat Reader, or have the Acroread plugin for your Web Browser
Form Number: GG24-4149-00
The purpose of this document is to provide information about IBM Red Books, together with a short description and their form number, that may be of use to the PC platform service community. You should be able to order these through the normal channels.
IBM Redbooks are made available by IBM's International Technical Support Centres.
Some Redbooks are available online at the URL referred to below.
Document Title: Using Network Security Program on AIX, OS/2, and DOS Platforms
Edition: First edition (March 1994) 135 Pages
Abstract:
This document describes Network Security Program (NetSP), which is a distributed authentication and key distribution programme that can run on the AIX/6000. OS/2, and DOS operating system platforms over TCP/IP, LU 6.2 and NetBIOS transfer protocols. The Network Security Program authenticates the identity of two communicating principles in the network and provides each with the ability to verify the identity of the other, without passwords being sent in clear across the network. The communicating principles can either be people (users) or programs (application servers). Messages can be signed and verified, so that any illicit alteration to them will be detected. The product also supports single signon to multiple host applications, again with passwords being sent in clear across the network.
This document was written for those who wish to install the product or write programs that use its APIs. Includes are examples of the results obtained when using the products, and sample applications which use the APIs provided.
Publication Type: |
IBM Red Books |
Additional Information: |
Search Keywords |
AIX, DOS, OS/2 | |
Document Category |
| |
Date Created |
08-08-95 | |
Last Updated |
12-11-97 | |
Revision Date |
30-06-98 | |
Brand |
Cross Brand | |
Product Family |
Various | |
Machine Type |
Various | |
Model |
| |
TypeModel |
| |
Retain Tip (if applicable) |
| |
Reverse Doclinks |