Preface |
Preface
|
Preface
|
Chapter 1 |
1
|
Introducing the Advanced Server
|
1.1
|
Platform and Application Independence
|
1.2
|
Network Integration Transports and Protocols
|
1.3
|
Integration with the OpenVMS System
|
1.4
|
Down-Level Interoperability
|
1.5
|
Management Interfaces
|
1.6
|
Security
|
1.7
|
Network File and Printer Sharing
|
1.8
|
User Environment Management
|
1.9
|
Monitoring and Tracking Network Activity
|
1.10
|
Network Browser Services
|
1.11
|
Server Configuration
|
1.12
|
License Management
|
1.13
|
Remote Network Management
|
1.14
|
Upgrading from Previous Versions
|
1.15
|
Solving Problems with the Advanced Server
|
Chapter 2 |
2
|
Domains and Trusts
|
2.1
|
Domain and Trust Relationships
|
2.2
|
Benefits of Using Domains
|
2.3
|
Allowing Users Access to Resources in Other Domains
|
2.4
|
Links Between Domains: Trust Relationships
|
2.4.1
|
Establishing a One-Way Trust Relationship
|
2.4.2
|
Establishing a Two-Way Trust Relationship
|
2.4.3
|
Nontransitive Trust Relationships
|
2.5
|
Domain Composition
|
2.5.1
|
Primary Domain Controller
|
2.5.2
|
Backup Domain Controller
|
2.5.3
|
Member Server
|
2.5.4
|
LAN Manager V2.x Servers
|
2.5.5
|
Windows NT Servers
|
2.5.6
|
Advanced Server for UNIX (Tru64 UNIX) Servers
|
2.6
|
Workstation Environments
|
2.6.1
|
Tips for Using Logon Scripts
|
2.6.2
|
Tips for Using Home Directories
|
2.6.3
|
Windows NT, Windows 2000 and Windows XP Workstation Computers
|
2.6.4
|
Windows for Workgroups Computers
|
2.6.5
|
Windows 95 and Windows 98 Computers
|
2.6.6
|
Windows, MS-DOS, and OS/2 Computers
|
Chapter 3 |
3
|
User Accounts
|
3.1
|
What is a User Account?
|
3.2
|
Setting Password and Account Policies for the Domain
|
3.3
|
Creating User Accounts
|
3.4
|
What Is a Built-In User Account?
|
3.4.1
|
Administrator Account
|
3.4.1.1
|
Logging On as System Administrator
|
3.4.2
|
Guest Account
|
3.4.2.1
|
Allowing Guest Access
|
3.5
|
Types of User Accounts
|
3.5.1
|
How Global Accounts Work
|
3.5.2
|
How Local Accounts Work
|
3.6
|
Mapping OpenVMS Users to Advanced Server Users
|
3.7
|
Password Synchronization
|
3.8
|
Allowing Users of Other Domains to Access the Advanced Server
|
3.9
|
Authenticating Logon Requests for Users
|
3.9.1
|
Authenticating Requests from Windows NT, Windows 2000 and Windows XP Computers
|
3.9.2
|
Authenticating Requests from Windows, Windows 95, Windows 98, MS-DOS, and OS/2 Computers
|
3.9.3
|
Authenticating Requests from LAN Manager Servers
|
3.10
|
Auditing User Actions
|
Chapter 4 |
4
|
Groups
|
4.1
|
What Is a Group?
|
4.2
|
Types of Groups
|
4.3
|
Global Groups
|
4.4
|
Local Groups
|
4.5
|
Differences Between Global and Local Groups
|
4.6
|
Using Global and Local Groups
|
4.7
|
Built-In Groups
|
4.7.1
|
Built-In Local Groups
|
4.7.1.1
|
Administrators
|
4.7.1.2
|
Server Operators
|
4.7.1.3
|
Account Operators
|
4.7.1.4
|
Print Operators
|
4.7.1.5
|
Backup Operators
|
4.7.1.6
|
Users
|
4.7.1.7
|
Guests
|
4.7.1.8
|
Using the Operators Local Groups
|
4.7.1.9
|
Setting Up a Universal Operators Group
|
4.7.2
|
Built-In Global Groups
|
4.7.2.1
|
Domain Admins
|
4.7.2.2
|
Domain Users
|
4.7.2.3
|
Domain Guests
|
4.8
|
Server-Specific Groups
|
4.9
|
Using Built-In Global and Local Groups
|
Chapter 5 |
5
|
Organizing Your Network into Domains
|
5.1
|
The Advanced Server Security Model
|
5.2
|
OpenVMS Security
|
5.2.1
|
RMS Protections
|
5.2.2
|
Access Control Lists
|
5.3
|
Additional Resource Protection
|
5.4
|
Advanced Server Security
|
5.4.1
|
Advanced Server Security Only Model
|
5.4.2
|
Advanced Server and OpenVMS Security Model
|
5.5
|
Security Integration Considerations
|
5.6
|
Single Domain Model
|
5.6.1
|
Single Domain Model: Example of Domain Configuration
|
5.6.2
|
Single Domain Model: Example of Network Security Configuration
|
5.7
|
Master Domain Model
|
5.7.1
|
Master Domain Model: Example of Domain Configuration
|
5.7.2
|
Master Domain Model: Example with MIS Master Domain
|
5.7.3
|
Master Domain Model: Example of Network Security Configuration
|
5.8
|
Multiple Master Domain Model
|
5.8.1
|
Multiple Master Domain Model: Example of Domain Configuration
|
5.8.2
|
Multiple Master Domain Model: Example of Network Security Configuration
|
5.9
|
Complete Trust Model
|
5.9.1
|
Complete Trust Model: Example of Domain Configuration
|
5.9.2
|
Complete Trust Model: Example of Network Security Configuration
|