Key Benefits; Scalability Parameters; Additional Configuration; Deployment Scenarios - Novell IFOLDER 3.8 - DEPLOYMENT Deployment Manual

Table of Contents

Advertisement

13.1 Key Benefits

The key benefits of iFolder deployment behind Access Manager are as follows:
Access Manager creates a trusted and secure connection between the user and the iFolder
application and iFolder employs an additional layer of security for mobile users to access their
data.
Novell iFolder can also be accessed via the SSL-VPN option of Access Manager for a trusted
tunnel connection.
This setup provides better access control and administration for the administrator to manage the
security aspects of an organization.

13.2 Scalability Parameters

Even though this provides an additional layer of access control and security, it does not affect the
scalability of the application. Instead, it provides more scalability because both Novell iFolder and
Access Manager are highly scalable, providing a multiplier effect.
This setup is ideal for small organizations of 500 to 1000 users.
Clients must have a dedicated network interface card (NIC) of 100 Mbps capacity.
Web-based access must be low and thick client access must be moderate, with 500 active
connections.
The data transfer (synchronization of user data) rate must be 10 MB per hour per client.
The synchronization interval must be 10 minutes.

13.3 Additional Configuration

During the Web Admin and Web Access setup, the Access Manager or iChain logout URL must be
specified for redirection. This helps iFolder ensure that the connection created by the user via
Access Manager is cleared properly. This URL can be obtained from the Access Manager or iChain
server configuration settings.
For more information on customizing the logout requests, see the "Customizing Logout Requests"
section of the Access Manager Administrator guide. For information on configuring Novell iFolder
Web Admin and Web Access to handle proper logout redirection, see the
Configuring iFolder

13.4 Deployment Scenarios

Consider the case of a company that has 200 branches with 50000 employees and 100 business
partners. All business partners are always on the move and at least 1000 employees are travelling at
any given point of time. Every employee and business partner has an identity in the company
eDirectory
to enable users to access their data at any time and anywhere.
Because the company has business partners and some of the business partners might also be
competitors, the business partners need more security while they store data in the company
repository, but at the same time they need accessibility to data.
58
Novell iFolder 3.8 Deployment Guide
Services" section in the
for access control of their respective applications and data. The company uses iFolder
TM
Novell iFolder 3.8 Administration
"Installing and
Guide.

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the IFOLDER 3.8 - DEPLOYMENT and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

This manual is also suitable for:

Ifolder 3.8

Table of Contents