Communication between clients and servers can also be secured using
a firewall. For more information, see
User authentication can be done using passwords or tickets, and the
strength of the password can be defined by an administrator. Users can
be authenticated against an Active Directory or LDAP server, or against
user database. See
for information about how you can authenticate users.
Access is defined using a protections that determine which
commands can be run, on which files, by whom, and from which host. See
to find out how you define protections.