Previous Topic: From Addresses

Next Topic: Trusted Access Database


To Addresses

This section describes the requirements for to addresses and related parameters for SMTP notifies (local and remote).

Local Notifies

For an SMTP email local notify, CA XCOM Data Transport uses the following parameter as the to address:

If this parameter has not been specified, then the results are as follows:

Note: The following parameters must also be set:

Remote Notifies

For an SMTP email remote notify, CA XCOM Data Transport uses the following parameter as the to address:

If this parameter has not been specified, then the results are as follows:

Note: The following parameters must also be set:

Pluggable Authentication Modules (PAM) Based Authentication

Starting with the r11.5 maintenance level 11112 and higher releases of CA XCOM, administrators have an option to select PAM-based authentication instead of the native mechanism available for the UNIX server.

PAM Overview

The Pluggable Authentication Modules (PAM) are an industry-standard framework providing authentication, account management, session management, and password services. PAM allows programs that rely on authentication to be written independently of the underlying authentication scheme. PAM uses the local password file to authenticate the user accessing the host, you can now take advantage of other authentication mechanisms such as LDAP.

Enabling PAM authentication in CA XCOM

To enable PAM authentication, modify the following global parameters.

  1. Set authentication type to PAM.

    AUTH_TYPE=PAM

  2. Specify the path where the PAM shared library is present.

    PAM_PATH=/usr/lib

Configure PAM Service

PAM can be configured through the use of either the /etc/pam.conf file or the /etc/pam.d directory. CA XCOM uses the service name of xcomauth.

Update the pam.conf file with the service name xcomauth and the other authentication settings detailed in the requirements.

As an example:

xcomauth auth XXXX XXXX

xcomauth account XXXX XXXX

The directory is an alternate configuration mechanism. In this scheme, each policy is contained in a separate file bearing the name of the service it applies to. Create an xcomauth config file with the authentication settings detailed in the requirements.

Note: If you are using LINUX-PAM, then the pam_userpass module must precede the actual authentication module. For more details on PAM configuration, refer to the PAM documentation.