Previous Topic: DCE Security ServerNext Topic: Using CA Top Secret as a Repository


How DCE Works

When a user passes from one DCE platform to another, the target platform passes information about the user (user credentials) along with other information to the DCE security server for authentication and authorization. The DCE security server authenticates such requests by checking the supplied user credentials against those stored in the DCE security server’s security repository and/or security registry. In performing this authentication, the DCE security server follows an authentication algorithm, which involves not only the user credentials but also involves encryption keys known for each platform. The algorithm is standards‑based and is platform independent. As a result, multiple vendors and platforms offer a DCE security server.

IBM’s z/OS OE/DCE Security Server product allows an IBM mainframe to perform these functions.