iChain 2

By Jim Rapoza  |  Posted 2001-12-17 Print this article Print

.0"> iChain 2.0

Novells iChain update features a well-implemented proxy approach that makes it a good choice for businesses in need of a capable access control system that can be quickly implemented and easily managed.

SHORT-TERM BUSINESS IMPACT // Using iChain, a company can quickly implement access control for an entire Web site without having to deal with Web server-based agents and detailed rules.

LONG-TERM BUSINESS IMPACT // Although iChains approach is attractive for quickly building access control, businesses moving into Web services and other Web application areas might need more developer-oriented access control down the road.

PROS: Proxy-based approach makes it easy to limit access to entire Web sites; good single-sign-on features.

CONS: Doesnt do granular application-level access control; must use Novell eDirectory as directory.

Novell Inc., Provo, Utah; (888) 321-4272; www.novell.com

Jim Rapoza, Chief Technology Analyst, eWEEK.For nearly fifteen years, Jim Rapoza has evaluated products and technologies in almost every technology category for eWEEK. Mr RapozaÔÇÖs current technology focus is on all categories of emerging information technology though he continues to focus on core technology areas that include: content management systems, portal applications, Web publishing tools and security. Mr. Rapoza has coordinated several evaluations at enterprise organizations, including USA Today and The Prudential, to measure the capability of products and services under real-world conditions and against real-world criteria. Jim Rapoza's award-winning weekly column, Tech Directions, delves into all areas of technologies and the challenges of managing and deploying technology today.

Submit a Comment

Loading Comments...
Manage your Newsletters: Login   Register My Newsletters

Rocket Fuel