Easy way to control IMAP access?

Is there an easier way to control which users have IMAP access though a GWIA
than by editing the class of service?
What would be nice is have a eDir group which would define the users that
can have access.
By default I have it set class of service that enables IMAP access for
everyone however I finding that more users are passing along the server
addresses and adding their mobile device to send/retrieve email which is
working but I would prefer some control over who and who doesn't have access
without cutting everyone off and adding them to the properties of the GWIA
agent.

Originally Posted by dzanre
Michael Rae wrote:
> What would be nice is have a eDir group which would define the users that can
> have access.
You can have a GW distribution list that controls it though. I do that at a
number of customer sites . . . .
Danita
Novell Knowledge Partner
Moving GroupWise to Linux?
Shopping Cart
Danita, so if I understand this correctly, a way to control IMAP access (for example, for just users that go through a Notifylink or BES server) would be to:
1.Disable IMAP on the GWIA default class of service
2.Create a Groupwise distribution list that includes the person(s) you want to use IMAP
3.Create a second class of service on the GWIA with SMTP disabled and IMAP enabled and include the distribution group created in the previous step.
4.Stop and restart the GWIA
Is it really that simple?
Jeff

Similar Messages

  • Controlling network access for user accounts

    Can anyone suggest a way to control airport access to a wireless network?
    I have an iMac G4 with AirPort running Tiger that I'd like to set up for a young teen to practice doing some video editing. I'd like to have network access disabled under normal circumstances, but be able to enable it easily during times when there is supervision.
    Ideally, I'd like to have the airport icon in the menubar and select a network to join causing a prompt for an administrator password. I can't seem to get anywhere close to that. Any help would be appreciated.
    Thanks.

    Thank you for your quick response.
    5. Click the checkbox under Require Administrator
    password to:
    The two choices I have are:
    - when changing networks
    - when creating a computer-to-computer network
    The first almost gets me what I want, there are two problems with this as I see it.
    1. when the computer comes up and automatically logs in, the user is greeted by authentication dialogs. (AirPort trying to connect?) I'd like to configure AirPort not to automatically try to connect and therefore not produce these dialogs.
    2. once approved, the network stays approved until the next reboot. I'd like to not be forced to reboot just to "lock down" the network again.
    Any help on those two points?

  • Is there an easy way to edit things under an invisible control

    For clarity, I should mention that I'm trying to do these actions during edit time and not programmatically.
    I have an invisible button floating over some other controls and a decoration. What's the easiest way to interact with the things under the invisible boolean. For example how would I delete or move the decoration or maybe toggle a boolean under the invisible button.  Of course I could click on the invisible button and move it out of the way and then move it back but I'm hoping there's an easier way so I don't have to worry about repositioning the invisible button or messing around with reordering controls.
    Message Edited by InfiniteNothing on 09-29-2009 02:00 PM
    CLD (2014)

    billko wrote:
    Why would you even have the invisible control overlaying the visible ones?  Why not park it outside the visible area of your VI?  Then you don't even have to make it invisible.  Or does this control become visible at some point when running the VI?
    Bill
    I have used large invisible controls to quickly disable large selections of the front panel. It is a quick way to disable lots of controls at one time. Yes, you can disable them individually but it can be easier to disable them using a single control. If the invisible control sits over the area you want to prevent the user from interacting with you simply enable the control access to the items underneath is blocked. Disable the invisible control and everything underneath becomes usable again. I don't use this technique often but it is handy at times.
     When I have used this technique a good way for interacting with the controls underneath are to drop a property node for the control in the VI and hide it. When it is hidden you can get at the items underneath it. When you are done editing unhide the control.
    Message Edited by Mark Yedinak on 09-29-2009 04:16 PM
    Mark Yedinak
    "Does anyone know where the love of God goes when the waves turn the minutes to hours?"
    Wreck of the Edmund Fitzgerald - Gordon Lightfoot

  • Is there a way to control access by IP Address?

     

    I'd like to follow up on this question using WLS 6.0/6.1.
    What I need to do is block access to a set of directories to public IP
    addresses. My usual approach would be to tweak the webserver
    configuration to deny the requests, but I can't seem to find
    documentation on how to accomplish this.
    So, if approach this with a ConnectionFilter, I can look at the
    ConnectionEvent's getRemoteAddress() method to determine whether the
    requestor is public or trusted, but can I get enough information from
    getProtocol() method to determine which directory they're requesting?
    Thanks,
    Matt Kleiderman
    Alvin wrote:
    Hi,Michael,
    Is there any way to control access to a particular application by ip address?
    For instance, there are multiple applications reside on the same WLS, some can
    be accessed publically, some only can be accessed by users from a certain ip address?
    The example you mentioned only applys to the whole WLS.
    Thanks.
    "Michael Girdley" <[email protected]> wrote:
    Yes:
    http://www.weblogic.com/docs51/classdocs/javadocs/weblogic/security/net/Conn
    ectionFilterImpl.html
    Thanks,
    Michael
    Michael Girdley
    Product Manager, WebLogic Server & Express
    BEA Systems Inc
    Mitchel Lang <[email protected]> wrote in message
    news:[email protected]..
    I was wondering if there is anyway to restrict access to WLS 5.1 by
    IP
    Address?
    I have a NES Server with SSL running communicating with a WLS server
    through
    the NASPI proxy. In order to maintain SSL we do not want anybody going
    directly against the WLS.
    Any Ideas would be helpful.
    Mitchel Lang
    Mgr. Application Architecture
    Time Inc.
    212.522.0748
    [email protected]

  • There are certain albums and songs I don't want my children having access to in iTunes Match through their iPod and iPad.  Is there a way to control what songs are visible on different devices?

    There are certain albums and songs I don't want my children having access to in iTunes Match through their iPod and iPad.  Is there a way to control what songs are visible on different devices?

    No.

  • Is there such a thing as "the easy way to access my Time Capsule"??

    Ok I'm totally new to Mac and I feel totally daft! I can't seem to figure out how to access my TimeCapsule from wherever I am in the world..... I read guides, I look at the manual but I am still totally lost! Can sameone please walk me through this, step by step, in a EASY way??

    Don't feel daft.. the fundamental principle of access from external location is a bit strange..
    But there are lots of posts about it.. look up remote access time capsule.
    Before I can give you simple info on how to set this up. I need some info..
    Does the TC get the public IP on the wan interface?
    For this to work in the simplest way.. the TC must be the only router in the network and handling WAN to LAN of your network.
    Once you do that. Find out the public IP of the TC.. you will see that on any site that reveals your public ip but it should also be available in the TC.
    In the setup of the TC via airport utility go to manual setup disk file sharing.. and check for wan access and give the TC disk a password.
    In the Mac you carry around.. from a real internet connection not the one your TC is connected to,
    Open finder.. top menu.. go, go to server.
    Type in AFP://ipaddressofTC
    You will then be asked for password which you will have to give..
    Tell us the info and if it worked.

  • Is there and easy way for Position control using analog input?

    Hi Everyone,
    I would like to set one of the axis with stepper motor using analog feedback to keep the set position which is coming from the analog input.
    In other words I would like the stepper to move when the analog input changes. I need it as a "background service" so the rest of the motion could be easily controlled from the NI-Motion Assistant.
    Is there any easy way to do this? Even complicated is ok but the control should be done by the NI Motion card not the PC processor.
    Thanks,
    Andras

    Hello Andras,
    please use the link below to get the motion example.
    http://zone.ni.com/devzone/cda/epd/p/id/353
    Kind regards,
    Elmar

  • HT1688 Is there an "easy" way to either 1) cut and paste a large block of text from the Messages app or 2) access this text through a computer?

    Is there an "easy" way to either 1) cut and paste a large block of text from the Messages app or 2) access this text through a computer?

    Tap and hold the text you want to copy, then tap Copy.

  • Easy Way to allow Mac Users to Access Windows Shares

    I have a client that runs a mix of macs and pcs.
    They have a seperate domain for macs running on an xserve with 10.2.8 server and a domain of windows 2000 servers for the pcs
    My question is, is there an easy way to allow the mac users to be authenticated to shares that are available on the windows 2000 network without having to be prompted with a different login? ie access the shares with there current mac login username and password?

    Hi
    If your mac clients can 'see' the windows domain then simply add a single generic user account on the Windows Server. Most people create a single account called macuser with the same password.
    Mac clients should now be able to command+K from the Go Menu and key in smb://windowserver'sIPaddress. They should be prompted for the user name and password.
    If you want to use the same account details as available on the Mac Server then you could export users from the local Node and import them into the Windows Server. Passwords are not retained using this method but if you don't have a lot of mac users you can simply re-key their passwords or use a password common to all and use a password policy forcing users to change them at next log-in. You could consider using something like Passenger which does retain passwords. Depending on which Windows Server it is I'm not sure how successful it would be reading imported account from such an old server version?
    Again if you don't have a lot of mac users simply key them all in.
    Tony

  • Don't install 6.0 just to access Store; easier way...

    I was going to upgrade from 4.7.1.3 to 6.0.1, but kept reading about all the install nightmares. The main reason I was going to do the install was to be able to play and purchase music in the iTunes Music Store (which had stopped working with the release of 6.0).
    If you don't care about playing video, I've found a much easier way to get back up and running.
    Just download the standalone version of Quicktime 7.0.3
    http://www.apple.com/quicktime/download/standalone.html
    Close all apps and install the new version of Quicktime.
    Now you should be able to play songs in the iTunes Music Store.
    - Good Luck

    many thanks for the report Phil! every little bit of info helps.
    I tried a few things, but in the end the simplest thing to do was to uninstall Windows Service Pack 2. Once that was done I was able to reinstall iTunes 6.0.2 without any problems.
    good lord ... that's also a workaround for the "publishing product information" quit (we used to use it in advice here prior to the later versions of that KB doc showing up).
    more evidence that the beast may have started to come with an error message nowadays ... it's not a 6.0.3.5 thing, though. Katrina has been working with one of those messages that showed up on a 6.0.2.23 install.
    i wonder if this is a by-product of a recent Windows Update?
    love, b

  • Is there a way  we can control Display access in SE16 at the row level?

    Table MARC has material master data at plant level,i want a user to be able to view only plant A via SE16.SAP has  objects to control access in MM03 but how can we control view access in SE16 without totally eliminating the table access.
    If not are there any alternatives?Like develop ZSE16 or create a new DB view etc?Appreciate your reply

    This link has some info where OB52 is restricted by company code - the principles may apply to your application though you will need to create a transaction for it
    http://www.sap-img.com/zf011.htm
    it also won't be any use if the user has SE16 or similar - though you don't give these if you want to restrict at any level lower than groups of table
    hope that helps
    cheers
    alex

  • How can I block IMAP access to allow only 1 external IP and all LAN IP's

    I have a PostFix/Dovecot Standard OSX server setup and functioning perfectly, but I need to make a pretty major tweak.
    Here is some background : I have 1 network connection that connects to the LAN and provides connection to the email server over the local LAN. I also have a satellite office that has access to the email server offsite over the internet on a different network connection.
    What I want to do is limit IMAP access to the server so they cannot access the email server from home, smartphone, or any other device. I only want them to be able to access their email from work.
    So I have a long list of local IP's 192.168.56/23 and one External IP 1xx.x.x.x I want to make sure has access to send and receive mail.
    I have been researching this and it looks like the config has to take place in dovecot since that is the imap server, but I am a novice at dovecot. I would love to just turn off the imap port from the firewall but that would block the satellite office and they would be unable to connect
    Anybody out there able to lead me in the right direction?

    I'd go out on a limb here and suggest that your best solution lies in setting up a VPN between the main and satellite offices. That way the remote office can share whatever resources you like in the main office without fear of opening services to unwanted users.
    Failing that, your next best option is some kind of policy/access control at your firewall/router. This may range anywhere from trivial to next-to-impossible depending on the make/model of your firewall/router.
    If your firewall/router can't do it then you could run a software firewall on your server, with access controls for the IPs you want to allow/block, but it's a poor option IMHO.
    Unfortunately there's no support for this kind of thing in dovecot itself, which is why you need to look further up the network for solutions.
    It's also worth mentioning that restricting dovecot access will do nothing for who can connect to your server to send mail. Dovecot is only concerned with end-user access to their mailboxes (e.g. IMAP) and has no bearing on who can submit messages to the server. For that you need to understand Postfix's configuration and access controls, but it's highly unlikely you want to restrict incoming SMTP to specific addresses only since that would prevent other domains' mail servers from sending you mail.

  • Is there an easy way to find out if a user has a message in their voicemail.

    Is there an easy way to find out if a user has a message in their voicemail from the
    UNITY subscriber page? Or anywhere I can look to see if they do.  I don't have access to the exchange servers.  We are currently running UNITY 5.0(1).  thanks

    The only way you'll be able to do that is to login to Outlook Web Access, or possibly setup an IMAP client to that user's mailbox or have TAC run the DohPropTest in attach mode to return the contents of the user's inbox.  If the first two don't work, I'd go with the latter and let TAC help you verify if there are any messages in the inbox that are unread.
    Hope that helps,
    Brad

  • Best authentication method for controlling DEVICE access to wlan

    Hello,
    I have a similar question to this thread ( https://supportforums.cisco.com/message/3927713 ) but I'm interested about device control on top of user control. Just like that thread, we are using WPA2-AES Enterprise with PEAP MSCHAPv2, which allow users to log on with their domain credentials. We wanted something simple for our users, so MSCHAPv2 with "single sign on" was optimal to us.
    Problem is, we have a new requirement and we need to implement it yesterday. We would like to allow only mobile devices and computers of our choice.
    Since we are using MSCHAPv2 which allow every domain user to connect using any device as long as their domain credentials are valid, is there a simple way to control this ?
    I guess we could go with MAC filtering, but we have about a thousand laptops. Not a big problem, we could do a regular MAC address inventory using SCCM. It's just that it looks like a brute force tactic to a simple problem. Would a Cisco ACE 4.1 RADIUS server tolerate well a MAC address table with a thousand entries ? What if it goes to two thousands ? Would this be easy to implement ? I'm a bit new to this, is there some documentation I could follow ?
    How do people usually do this in an elegant way ? How do you manage and control WLAN access to thousands of device ? I guess they go with TLS with certificates ?
    Thank you very much !
    Konnan

    Konnan,
    Just saw your PM:)
    Would it be possible to configure Access policies even if our Radius servers aren't joined to the domain ?
    > I really don't know... typically all my installs have the radius server joined to the domain.  I don't know what limitations you would have using the setup you currently are using.
    Still wondering if it would be a good path for us, because of the computer authentication issue where it happens only at logon in Windows if I read correctly and our users don't have the habit to log off frequently and we use only manual connection mode when the user already has his session open. I guess MAR will have to be set to a stupid high value... if it even works.
    > Well you need to sit down with everyone who is involved and really think out what works best for you.  Machine authentication works well, but then people wonder what happens if someone logs in that isn't authorized and that because the computer is a domain computer it automatically gets on the network.  Well your not going to get everything you want:)  So PEAP has issue because IT wants to limit the user to only be able to access using a company owned device... well, then ISE is your fix.  You can add a certificate that ISE can see and if that device has that or a registry value and the user is allowed to access the network, the authentication is allowed, or else it will not be.  EAP-TLS... well more work since you need a PKI infrastructure and both the radius and the clients need a cert...
    No matter what, you need to decide what works best and don't over complicate it with adding mac filter, etc.
    I'm wondering if EAP-TLS wouldn't be better for the long term, maybe with MAC Address restriction on the short term...
    > See above
    I'm also wondering if we could stay with PEAP MSCHAPv2 but use an NPS Radius server from Microsoft which allow to use complex policies instead of the Cisco ACS Radius server...
    > You need to know how to setup and configure the policies... either one will work, but if your on ACS 4.x, I would look at upgrading to 5.4.  ISE is replacing ACS as far as the radius portion, but tacacs isn't yet available on ISE.
    There's also the Cisco ISE, which seems to be equivalent to Microsoft NPS... a bit more costly OTOH.
    > ISE allows you to profile devices so you know what device is accessing your network.  Again, ISE is replacing ACS as far as the radius, but tacacs will soon be out and available for ISE.  If you really want to create crazy profiles, then ISE is the way to go.  You can specify that this user group is allowed wireless, but it has to be a domain computer.  The user isn't allowed access if its not a domain computer.  The same user group is allowed access with company iPads (certificate installed), but not have access with personal iPads, tablets or smartphones.
    Hope this helps.
    Thanks,
    Scott
    Help out other by using the rating system and marking answered questions as "Answered"

  • Time machine makes 30 backups for the last two days, no backups for any earlier times: is there a way to control it?

    I've been running Time Machine in the background for as long as I've owned my current Mac--- a few months.  It is a completely generic set-up: it's a desktop (rarely shut off or asleep) connected to an external hard drive that is much larger (1 TB) than my internal hard drive (0.5 TB), and Time Machine is configured to save backups of my whole internal drive to the external drive.  The external is half-full, and the internal is a little more than half-full.  I often hear my external crunching away, working on something.
    I recently needed to access an old file, so I went into Time Machine mode on the folder where it had been deleted a few weeks ago.  While I'm not upset that it isn't available (it's my own fault for deleting it), I didn't expect the Time Machine to have such a bad distribution of saved backups.  There are 30 backup snapshots of the past two days, and nothing earlier.  I was expecting something more like a few from today, a few from this week, a few from this month, and a few going all the way back in time--- a broader distribution.
    I don't see any way to control this in the Time Machine Preferences (in fact, very little control at all).  Is there a secret way to control it, or some tip to ensure a more useful distribution of saved snapshots?
    Thanks,
    -- Jim

    Thanks, but it doesn't exactly address my question.  TimeMachineEditor allows me to set the intervals or times when backups occur, but it doesn't control the algorithm that decides which snapshots should be deleted.  My problem was that Time Machine chose to delete all of the old snapshots and keep only the most recent ones: I'd like it to keep more of the recent ones than the old ones, but still keep some old ones.
    In fact, the (unmodifyable) text on the Time Machine control panel says that it keeps:
    hourly backups for the past 24 hours
    daily backups for the past month
    weekly backups for all previous months
    That would be perfect if it were true.
    Perhaps the algorithm did the wrong thing because the size of my internal hard drive varied quite a lot a few days ago: a process got out of control and used up all of my internal disk space.  I killed the process and deleted its output (several times), so my internal disk eventually went back down to normal.  Perhaps in the intervening hours, Time Machine made a backup, once an hour, and used up all of the external drive space.  When it had to choose between keeping "weekly backups of previous months" and "hourly backups of the past 24 hours", it chose to keep hourly backups of the past 24 hours.  This was the wrong choice in my case (it was the unwanted output) and is probably the wrong choice in most cases.
    Is there a way to control the algorithm that decides which backups to keep and which to delete?  I would have it delete the hourly, daily, and weekly backups in a way that preserves their relative distribution.
    By the way, while I have made it sound like my problem was a runaway log file (something that would be easy to put in an excluded directory with Time Machine's "Options" button), it was a VirtualBox snapshot merge.  The data in question are precious, but were unnecessarily copied many times while VirtualBox failed to merge them properly.  I can't simply exclude a directory: I'm talking about a more general problem.
    Thanks!
    -- Jim

Maybe you are looking for