NOC authentication
D
Main benefits ............................................................................................................... D-2
How it works................................................................................................................ D-2
NOC authentication list ....................................................................................... D-6
Define attributes ................................................................................................... D-7
Authenticating users ................................................................................................... D-8
Returned values .................................................................................................... D-9
Forcing user logouts ................................................................................................. D-13
E
Overview ...................................................................................................................... E-2
Contents
xix