Skip to Main Content
DCE Replacement Strategies
book

DCE Replacement Strategies

by Heinz Johner, Jakob Erber, Stephen Hawkins, Klaus Mueller, Pallavi Nagesha Rao, Donna Skibbie
June 2003
Intermediate to advanced content levelIntermediate to advanced
454 pages
10h 19m
English
IBM Redbooks
Content preview from DCE Replacement Strategies
152 DCE Replacement Strategies
groups using the proper dcecp commands. This will remove only the DCE-related
attributes from the objects in the IBM DirectoryServer that are not used
otherwise. The Kerberos and IBM Tivoli Access Manager information will still be
defined and usable.
Examples:
dcecp> princ delete <user name>
dcecp> group delete <group name>
Finally, when all DCE dependencies are removed, you can also remove the DCE
security server from the environment and unconfigure the DCE cell.
8.4 Revised application discussion
In this section, the example introduced in section “DCE application” on page 129,
is presented in a revised form with all DCE dependencies replaced. As
introduced earlier, the Windows Security Service Provider Interface ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Reinventing the Organization for GenAI and LLMs

Reinventing the Organization for GenAI and LLMs

Ethan Mollick

Publisher Resources

ISBN: 0738453080Purchase book