Network Manager 3.0.0 (full version)
 
Table of Contents
Start
Table of Contents
1. Conventions
2. General information about David system
3. Terminology
4. Installation
5. Network Manager requirements
6. Installation
7. Network Manager (NM)
8. Network Management Map Client (dnmmc)
9. Service of Network Management Map (dnmmsd)
10. Enhanced Data Collector (dedcd)
11. Slow Query Executor (dsqed)
12. Network Management Map (xdnmm)
13. Network Nodes Viewer (xdnnv)
14. Network Node Views Editor (xdnnve)
15. Buttons the most often used in Web applications
16. Excluded IP Address Configurator
17. SNMP Community Configurator
18. User and Group Manager
19. User Manager
20. Group Manager
21. Collection Browser
22. Node Browser
23. Node Reporter
24. Notification Recipient Configurator
25. Web Module Configurator
26. Service Monitor
27. Customer Configurator
 
 

9.6. Client service

When dnmmsd waits for client requests sending through a network and receives a new connection attempt, then authorizes the client depending on IP address of the client. The authorization result depends on information included in the file .known.hosts. If the module can't open .known.hosts file for reading or the client's IP address doesn't match to any entry of the file, the connection is rejected. When the daemon waits for client requests through a socket file, the authorization is skipped. The new connection can be also rejected, when maximum number of connections is reached (--max-graphic-clients option).

After the successful acceptation of a new incoming connection a user-based authentication is prepared on the basis of Users' Database of David system.

After the successful login procedure the user can read and write data from and to the Network Information Database. Also the user can receive notifications about every change of any object in the Database. It reduces traffic and amount of operations between clients and the daemon because clients don't need to ask about each object state all the time.

Every client can login many times and each time as another user. A logged in user has rights according to the Users' Database. The users, besides operations on the Database that number exceeds one hundred, can do the following operations:

  • log out;

  • log out lower level users;

  • list logged in users.