rivsy Lv5Posted 17 Oct 2022 14:17
  
The users adopting DKey authentication need submit the user information saved in DKey to IAM device,
which will then identify the user according to the DKey authentication information. Among the four authentications, the DKey authentication has the highest priority. If you insert the DKey into a computer
that is already authenticated using other method, the identity of the computer will be changed into DKey
user with the corresponding privileges.
There are two types of DKey: One is authentication DKey; the other is audit-free DKey. The audit-free
DKey has not only the authentication function, but also the privilege to be exempt from being audited by
the IAM device, which means the IAM device will not monitor nor record the behaviors of the audit-free
DKey user

I Can Help:

Change

Moderator on This Board

15
21
3

Started Topics

Followers

Follow

Board Leaders