Apple Mac OS Benutzerhandbuch
Chapter 2
Setting Up and Managing iChat Service
23
5
Select the level of restriction you want for the services:
To restrict access to all services, select “For all services.”
To set access permissions for individual services, select “For selected services below”
and select the services from the Service list.
and select the services from the Service list.
6
Select the level of restriction you want for users and groups:
To provide unrestricted access, click “Allow all users and groups.”
To restrict access to specific users and groups, select “Allow only users and groups
below,” click the Add (+) button to open the Users and Groups drawer, and then drag
users and groups from the Users and Groups drawer to the list.
below,” click the Add (+) button to open the Users and Groups drawer, and then drag
users and groups from the Users and Groups drawer to the list.
7
Click Save.
Setting SACL Permissions for Administrators
Use Server Admin to set SACL permissions for administrators to monitor and manage
iChat.
iChat.
To set administrator SACL permissions for iChat:
1
Open Server Admin and connect to the server.
2
Click Settings.
3
Click Access.
4
Click Administrators.
5
Select the level of restriction you want for the services:
To restrict access to all services, select “For all services.”
To set access permissions for individual services, select “For selected services below”
and select the services from the Service list.
and select the services from the Service list.
6
Click the Add (+) button to open the Users and Groups list.
7
Drag users and groups to the list.
8
Set the user’s permission:
To grant administrator access, choose Administrator from the Permission pop-up menu
next to the user name.
next to the user name.
To grant monitoring access, choose Monitor from the Permission pop-up menu next to
the user name.
the user name.
9
Click Save.
Using SSL for iChat
You can maximize the privacy of chats by implementing SSL with iChat. SSL uses a
digital certificate to validate the identity of the server and to establish secure,
encrypted data exchanges for client-to-server and server-to-server connections.
digital certificate to validate the identity of the server and to establish secure,
encrypted data exchanges for client-to-server and server-to-server connections.