IBM Books

Planning Volume 2, Control Workstation and Software Environment

Planning for standard AIX authentication

There are no special installation or configuration considerations to use Standard AIX authentication. It comes with your AIX 4.3.3 operating system. Standard AIX authentication is based on IP address or a user ID and password. Access is based on the contents of a file in the user's home directory. The .rhosts file contains the list of authorized source host names and user names. A system administrator who is logged in as root can perform all installation tasks.

[ Top of Page | Previous Page | Next Page | Table of Contents | Index ]