To modify how the IBM Telephone Directory V5.2 application is accessed by users, use the IBM Telephone Directory V5.2 administrator pages. Perform the following steps:
Access the IBM Telephone Directory V5.2 administrator pages by entering the following Web address in your Web browser:
http://your.server.name:port/ibm-bizApps/welcome/admin.dowhere your.server.name is the name of the server where IBM Telephone Directory V5.2 is installed and port is the port number that was specified during installation.
Anonymous (no login) - Select this option if you want any user to be able to search the directory, but also want to prevent the user from logging into the application. When this option is chosen, directory search requests are always performed under anonymous user authority, and users can not log into the application to update or delete entries. The Allow users to update and delete entries, options are not available when this option is selected.
Login Enabled - Select this option if you want any user to search the directory, and to log into the application using their user ID and password for other application options. When this option is chosen, directory search requests are performed under anonymous user authority, like the Anonymous option, but users can log into the application to update or delete entries, if enabled. The Allow users to update and delete entries, options are available when this option is selected.
Login Required - Select this option if you want to require users to log in before they can use the application. When this option is chosen, directory search requests are always performed under the user's authority. Users that do not provide a valid user ID and password can not search the directory and cannot use any of the other optional functions in the application. The Allow users to update and delete entries, options are available when this option is selected.
Entries are not required to have passwords. Entries that do not have passwords cannot be used to login and cannot be used to search, update, or delete entries, or use any of the other optional functions that require a log in. Set a password for those entries that you want to log into. Omit a password for those entries that you want prohibit login. Entries that do not have a password can be searched to display information about particular individuals, without giving those individuals the ability to log in.
When Login Enabled or Login Required is configured, consider setting up the following options: