Not true.  Redback database requests are handled by dedicated universe
processes (responders).  These responders are logged in under the Redback
user ID setup by the administrator.   Requests for data or processing come
in anonymously via the web to the responders.   Any additional
authentication/security must added by the developer at the application
level.

Mike Randall

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of gerry-u2ug
Sent: Tuesday, December 07, 2004 8:43 AM
To: [EMAIL PROTECTED]
Subject: RE: [U2] [ot] hpux11/uv10 validate user login


Ok - so now to the actual question :

Their web interface is driven built on redback & I have zero experience with
or knowledge of it.  I would have thought os(unix) level user authentication
would have been handled within redback as part of its basic
design/functionality.  True or not true ?


Gerry
-------
u2-users mailing list
[EMAIL PROTECTED]
To unsubscribe please visit http://listserver.u2ug.org/
-------
u2-users mailing list
[EMAIL PROTECTED]
To unsubscribe please visit http://listserver.u2ug.org/

Reply via email to