Here are some requirements that I am asked to provide today... An authentication scheme that can be implemented in a proxy to tie in a user to a request that is strong enough that if the user breaks the company rules then the employee can be dismissed. That is I need auth that can be demonstrated in a court of law as being "spoof proof" Can we do it? Pete. -- The TIS Network Security Products Group has moved! voice: 301-527-9500 x123 fax: 301-527-0482 2277 Research Boulevard, 5th Floor, Rockville, MD 20850Received on Wednesday, 21 February 1996 06:32:23 UTC
This archive was generated by hypermail 2.4.0 : Thursday, 2 February 2023 18:42:57 UTC