... connectivity uses a version of the Secure Sockets Layer (SSL) protocol but does so without using digital certificates. Instead, device authentication is accomplished via service tools device profiles. These profiles, which are stored on the iSeries, contain a cryptographic key (i.e., password) that the PC trying to act as ... Information about the PC associated with a particular device profile is stored on the PC. ... To activate this menu item, you must unlock it using a native macro in DST.
Title | : | Experts' Guide to OS/400 & I5/OS Security |
Author | : | Carol Woodbury, Patrick Botz |
Publisher | : | System iNetwork - 2004-01-01 |
You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.
Once you have finished the sign-up process, you will be redirected to your download Book page.
How it works: