The location of an object within the Directory tree, or name context, is also important when logging in. When a user logs in to the network, an available server begins a process called authentication.
Based on the current context and the login name provided, authentication identifies the User object to other servers in the tree and verifies that the object has rights to use network resources.
Authentication allows a user who has logged in to the network to access any servers, volumes, printers and so on, in the network that the user has rights to. Conversely, if the users lacks rights, access is denied.
Authentication checks a user's rights to both NDS and filesystem resources. This is one way you, as a network supervisor, can regulate security.
Authentication works in combination with the Access Control List to provide network security. See ``Object and property rights'' for more information on property rights.