6.0 Understanding LDAP Authentication

The previous sections in this document described how to install and set up the basic implementation described in Section 2.2, Installation Scenario. To meet your company's networking needs, you might need to augment or alter this implementation and use some of the more advanced features of NovellĀ® iChainĀ® services. This section describes the following Novell iChain configuration procedures: