Copyright (C) 2000-2012 |
Whole document tree 17.8. AuthenticationA careful study of the authentication problem shows that it should be done during reception of commands and/or jobs from a remote user and/or spooler. At this time the following must be done:
|