7.1 Using Token Authentication with iChain

You can configure Novell iChain® to leverage the authentication service provided by Novell Modular Authentication Services (NMAS™) Enterprise Edition. You can set up your iChain users so they are required to authenticate to eDirectory™ using a token device. This adds a higher level of protection to your information by ensuring that only those who have the proper token code can have access to your information.

There are three steps you must perform to set up token authentication with iChain:

  1. Section 7.2, Installing NMAS, Novell RADIUS, and a Token Method.

  2. Section 7.3, Configuring Novell RADIUS Components.

  3. Section 7.4, Setting Up the iChain RADIUS Client.

IMPORTANT:Time restriction, intruder lockout, and login disabled are checked only if you are using the Novell NMAS Radius server in the same tree as the iChain Authorization tree. Also, the LDAP server does the checks only if the Radius Token authentication is ANDed with an LDAP authentication.