Skip to Main Content
DCE Replacement Strategies
book

DCE Replacement Strategies

by Heinz Johner, Jakob Erber, Stephen Hawkins, Klaus Mueller, Pallavi Nagesha Rao, Donna Skibbie
June 2003
Intermediate to advanced content levelIntermediate to advanced
454 pages
10h 19m
English
IBM Redbooks
Content preview from DCE Replacement Strategies
62 DCE Replacement Strategies
2. Acquire or develop a password strength server. The password strength server
needs to perform expanded password checking based on the configuration of
password rules, dictionary lists, and policies.
3.1.17 Protection
There are no DCE applications that directly access this service because it
can be accessed indirectly by means of the DCE GSS-API or RPC security
services only. For applications that indirectly access the DCE protection
service by means of DCE GSS-API, see section 3.1.6, “Delegation, GSS-API,
and login” on page 56. For applications that indirectly access the DCE
protection service by means of DCE RPC security, see section 3.1.19, “RPC
services” on page 63.
3.1.18 Registry
The recommended C/C++ strateg ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Reinventing the Organization for GenAI and LLMs

Reinventing the Organization for GenAI and LLMs

Ethan Mollick

Publisher Resources

ISBN: 0738453080Purchase book