ibm-information-center/dist/eclipse/plugins/i5OS.ic.rzakh_5.4.0.1/rzakhlegal.htm

239 lines
14 KiB
HTML
Raw Permalink Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en-us" xml:lang="en-us">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="security" content="public" />
<meta name="Robots" content="index,follow" />
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
<meta name="DC.Type" content="reference" />
<meta name="DC.Title" content="Special terms and conditions" />
<meta name="abstract" content="This information contains special terms, conditions, and trademarks applicable to network authentication service." />
<meta name="description" content="This information contains special terms, conditions, and trademarks applicable to network authentication service." />
<meta name="DC.Relation" scheme="URI" content="rzakh000.htm" />
<meta name="copyright" content="(C) Copyright IBM Corporation 1998, 2006" />
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 1998, 2006" />
<meta name="DC.Format" content="XHTML" />
<meta name="DC.Identifier" content="rzakhlegal" />
<meta name="DC.Language" content="en-us" />
<!-- All rights reserved. Licensed Materials Property of IBM -->
<!-- US Government Users Restricted Rights -->
<!-- Use, duplication or disclosure restricted by -->
<!-- GSA ADP Schedule Contract with IBM Corp. -->
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
<link rel="stylesheet" type="text/css" href="./ic.css" />
<title>Special terms and conditions</title>
</head>
<body id="rzakhlegal"><a name="rzakhlegal"><!-- --></a>
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
<h1 class="topictitle1">Special terms and conditions</h1>
<div><p>This information contains special terms, conditions, and trademarks
applicable to network authentication service.</p>
<div class="section"><p>This information was developed for products and services offered
in the U.S.A. IBM<sup>®</sup> may
not offer the products, services, or features discussed in this document in
other countries. Consult your local IBM representative for information on the
products and services currently available in your area. Any reference to an IBM product,
program, or service is not intended to state or imply that only that IBM product, program,
or service may be used. Any functionally equivalent product, program, or service
that does not infringe any IBM intellectual property right may be used instead.
However, it is the user's responsibility to evaluate and verify the operation
of any non-IBM product, program, or service.</p>
<div class="p">IBM may
have patents or pending patent applications covering subject matter in this
document. The furnishing of this document does not give you any license to
these patents. You can send license inquiries, in writing, to: <p>IBM Director of Licensing<br />
IBM Corporation<br />
North Castle Drive<br />
Armonk, NY  10504-1785<br />
U.S.A.</p>
</div>
<div class="p">For license inquiries regarding double-byte (DBCS) information,
contact the IBM Intellectual
Property Department in your country or send inquiries, in writing, to:<p>IBM World Trade Asia Corporation Licensing<br />
2-31 Roppongi 3-chome, Minato-ku<br />
Tokyo 106-0032, Japan</p>
</div>
<p><strong>The following paragraph does not apply
to the United Kingdom or any other country where such provisions are inconsistent
with local law: </strong>INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS
PUBLICATION <span class="q">"AS IS"</span> WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR
IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT,
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow
disclaimer of express or implied warranties in certain transactions, therefore,
this statement may not apply to you.</p>
<p>This information could include
technical inaccuracies or typographical errors. Changes are periodically
made to the information herein; these changes will be incorporated in new
editions of the information. IBM may make improvements and/or changes
in the product(s) and/or the program(s) described in this information at any
time without notice.</p>
<p>Any references in this information to non-IBM Web
sites are provided for convenience only and do not in any manner serve as
an endorsement of those Web sites. The materials at those Web sites are
not part of the materials for this IBM product and use of those Web sites
is at your own risk.</p>
<div class="p">Licensees of this program who wish to have information
about it for the purpose of enabling: (i) the exchange of information between
independently created programs and other programs (including this one) and
(ii) the mutual use of the information which has been exchanged, should contact: <p>IBM Corporation<br />
Department LZKS<br />
11400 Burnet Road<br />
Austin, TX 78758<br />
U.S.A.</p>
</div>
<p>Such information may be available, subject to appropriate
terms and conditions, including in some cases, payment of a fee.</p>
<p>The
licensed program described in this document and all licensed material available
for it are provided by IBM under terms of the IBM Customer Agreement, IBM International
Program License Agreement, or any equivalent agreement between us.</p>
<p> Any
performance data contained herein was determined in a controlled environment.
Therefore, the results obtained in other operating environments may vary
significantly. Some measurements may have been made on development-level
systems and there is no guarantee that these measurements will be the same
on generally available systems. Furthermore, some measurement may have been
estimated through extrapolation. Actual results may vary. Users of this
document should verify the applicable data for their specific environment. </p>
<p>Information
concerning non-IBM products was obtained from the suppliers of those products,
their published announcements or other publicly available sources. IBM has not tested
those products and cannot confirm the accuracy of performance, compatibility
or any other claims related to non-IBM products. Questions on the capabilities
of non-IBM products should be addressed to the suppliers of those products.
</p>
<p>All statements regarding IBM's future direction or intent are subject
to change or withdrawal without notice, and represent goals and objectives
only. </p>
<p>All IBM prices shown are IBM's suggested retail prices, are
current and are subject to change without notice. Dealer prices may vary.</p>
</div>
<div class="section"><p>COPYRIGHT LICENSE:</p>
<p>This
information contains sample application programs in source language, which
illustrates programming techniques on various operating platforms. You may
copy, modify, and distribute these sample programs in any form without payment
to IBM,
for the purposes of developing, using, marketing or distributing application
programs conforming to the application programming interface for the operating
platform for which the sample programs are written.</p>
<p>These examples have
not been thoroughly tested under all conditions. IBM, therefore, cannot guarantee or imply
reliability, serviceability, or function of these programs. </p>
<p>Each copy
or any portion of these sample programs or any derivative work, must include
a copyright notice as follows: </p>
<p>© (your company name) (year). Portions
of this code are derived from IBM Corp. Sample Programs. © Copyright IBM Corp.
2006. All rights reserved.</p>
</div>
<div class="section"><p>If you are viewing this information softcopy, the photographs
and color illustrations may not appear.</p>
</div>
<div class="section"><p>The following copyright and permission notice applies to portions
of this information that were obtained from the Massachusetts Institute of
Technology. </p>
<p>Copyright (C) 1985-1999 by the Massachusetts Institute
of Technology. </p>
<p>Export of software employing encryption from the United
States of America may require a specific license from the United States Government.
It is the responsibility of any person or organization contemplating export
to obtain such a license before exporting.</p>
<p>WITHIN THAT CONSTRAINT, permission
to use, copy, modify, and distribute this software and its documentation for
any purpose and without fee is hereby granted, provided that the above copyright
notice appear in all copies and that both that copyright notice and this permission
notice appear in supporting documentation, and that the name of M.I.T. not
be used in advertising or publicity pertaining to distribution of the software
without specific, written prior permission. Furthermore if you modify this
software you must label your software as modified software and not distribute
it in such a fashion that it might be confused with the original MIT software.
M.I.T. makes no representations about the suitability of this software for
any purpose. It is provided "as is" without express or implied warranty. </p>
<p>The
following copyright and permission notice applies to the OpenVision Kerberos
Administration system located in kadmin/create, kadmin/dbutil, kadmin/passwd,
kadmin/server, lib/kadm5, and portions of lib/rpc:</p>
<p>Copyright, OpenVision
Technologies, Inc., 1996, All Rights Reserved WARNING: Retrieving the OpenVision
Kerberos Administration system source code, as described below, indicates
your acceptance of the following terms. If you do not agree to the following
terms, do not retrieve the OpenVision Kerberos administration system. You
may freely use and distribute the Source Code and Object Code compiled from
it, with or without modification, but this Source Code is provided to you
"AS IS" EXCLUSIVE OF ANY WARRANTY, INCLUDING, WITHOUT LIMITATION, ANY WARRANTIES
OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, OR ANY OTHER WARRANTY,
WHETHER EXPRESS OR IMPLIED. IN NO EVENT WILL OPENVISION HAVE ANY LIABILITY
FOR ANY LOST PROFITS, LOSS OF DATA OR COSTS OF PROCUREMENT OF SUBSTITUTE GOODS
OR SERVICES, OR FOR ANY SPECIAL, INDIRECT, OR CONSEQUENTIAL DAMAGES ARISING
OUT OF THIS AGREEMENT, INCLUDING, WITHOUT LIMITATION, THOSE RESULTING FROM
THE USE OF THE SOURCE CODE, OR THE FAILURE OF THE SOURCE CODE TO PERFORM,
OR FOR ANY OTHER REASON.</p>
<p>OpenVision retains all copyrights in the donated
Source Code. OpenVision also retains copyright to derivative works of the
Source Code, whether created by OpenVision or by a third party. The OpenVision
copyright notice must be preserved if derivative works are made based on the
donated Source Code. OpenVision Technologies, Inc. has donated this Kerberos
Administration system to MIT for inclusion in the standard Kerberos 5 distribution.
This donation underscores our commitment to continuing Kerberos technology
development and our gratitude for the valuable work which has been performed
by MIT and the Kerberos community.</p>
<p>Kerberos V5 includes documentation
and software developed at the University of California at Berkeley, which
includes this copyright notice:</p>
<p>Copyright (C) 1983 Regents of the University
of California. All rights reserved.</p>
<p>Redistribution and use in source
and binary forms, with or without modification, are permitted provided that
the following conditions are met:</p>
<ol><li>Redistributions of source code must retain the above copyright notice,
this list of conditions and the following disclaimer.</li>
<li>Redistributions in binary form must reproduce the above copyright notice,
this list of conditions and the following disclaimer in the documentation
and/or other materials provided with the distribution.</li>
<li>All advertising materials mentioning features or use of this software
must display the following acknowledgement: <p>This product includes software
developed by the University of California, Berkeley and its contributors. </p>
</li>
<li>Neither the name of the University nor the names of its contributors may
be used to endorse or promote products derived from this software without
specific prior written permission.</li>
</ol>
<p>Permission is granted to make and distribute verbatim copies of this
manual provided the copyright notices and this permission notice are preserved
on all copies.</p>
<p>Permission is granted to copy and distribute modified
versions of this manual under the conditions for verbatim copying, provided
also that the entire resulting derived work is distributed under the terms
of a permission notice identical to this one. Permission is granted to copy
and distribute translations of this manual into another language, under the
above conditions for modified versions.</p>
</div>
<div class="section" id="rzakhlegal__tmk"><a name="rzakhlegal__tmk"><!-- --></a><h4 class="sectiontitle">Trademarks</h4><div class="p">The following terms are trademarks
of International Business Machines Corporation in the United States, other
countries, or both:<ul><li>AIX<sup>®</sup></li>
<li>IBM</li>
<li>Tivoli<sup>®</sup></li>
<li>VisualAge<sup>®</sup></li>
</ul>
</div>
<p>Kerberos is a trademark of the Massachusetts Institute of Technology
(MIT).</p>
<p>Microsoft<sup>®</sup>, Windows<sup>®</sup>, Windows NT, and the Windows logo
are trademarks of Microsoft Corporation in the United States, other
countries, or both.</p>
<p> LINUX is a trademark of Linus Torvalds in the U.S.,
other countries, or both.</p>
<p>Other company, product, and service names
may be trademarks or service marks of others.</p>
</div>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzakh000.htm" title="Network authentication service allows the iSeries server and several iSeries services, such as iSeries eServer Access for Windows, to use a Kerberos ticket as an optional replacement for a user name and password for authentication.">Network authentication service</a></div>
</div>
</div>
</body>
</html>