February 01, 2003
from $10 (volume license)
- Ease of Use:
- Value for Money:
- Overall Rating:
Perfect for the larger heterogeneous environment where security is taken very seriously, and is required on more than one user level.
Not ideal for the smaller organization or to simply solve the problem of remote access for employees.
A very strong authentication solution that delivers everything from single sign-on to multiple authentication models where security is of the highest priority.
Not all remote access initiatives are used solely to provide employees with multi-location access. It may be necessary to provide a wider core of access rights that are in line with your business activities and, therefore, a more extensive resource may be required to fulfill all of your objectives.
This is where a solution such as Novell iChain comes into its own. This solution accomplishes more than simply allowing one level of access. It is capable of delivering a web-based authentication process that can be granular to your business needs, allowing customers and partners to access areas crucial for your commercial needs.
iChain is deployed within the organization to provide an identity-based authentication through its eDirectory. When a user authenticates, he or she is governed by rights and privileges extended to their particular identity.
Installation remains at the administrator level and users gain access by utilizing the authentication methods bestowed on them by their administrator. These will depend on the level of security required, from single sign-on through to tokens provided by big names such as RSA and ActivCard. Password authentication methods can be used, with stipulated password lengths to further enhance security levels, and during communications SSL is active to ensure secure data transfers.
From a user perspective iChain is simple enough, requiring only the method of authentication and the privileged information to make it happen. Digital certificates are also supported; identifiers such as user name, email address and LDAP known attributes may also be manipulated or several methods may be utilized to enhance the security levels in practice.
The software is delivered on two CDs, with installation explained fully within well written documentation provided in pdf format. The software uses a proxy-based method and fits neatly into most environments. The beauty of this kind of solution is that it can be managed centrally. Users do not have to concern themselves with installing and managing software or hardware to stay secure.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Microsoft update left Azure Linux virtual machines open to hacking
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- ICYMI: CEO Sacked; MS Zero-day; Passwords dropped; Ransomware wild, charging hack
- 9.2 million medical records for sale on darkweb
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry