18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 10: Setting Up Authentication<br />

Authentication process overview<br />

Authentication<br />

process<br />

overview<br />

282<br />

Figure 129:<br />

Authentication servers<br />

supported by the<br />

<strong>Sidewinder</strong> <strong>G2</strong><br />

For all authentication methods, a warder in the <strong>Sidewinder</strong> <strong>G2</strong> communicates<br />

with an authentication server to validate users. A warder provides an interface<br />

between the proxy s<strong>of</strong>tware and the various authentication services. As shown<br />

in Figure 129, there is a separate warder for each authentication method.<br />

3<br />

<strong>Sidewinder</strong> <strong>G2</strong><br />

proxy<br />

active rules<br />

Windows Domain<br />

warder<br />

LDAP warder<br />

RADIUS warder<br />

SNK warder<br />

SecurID warder<br />

SafeWord<br />

warder<br />

password warder<br />

user database<br />

2 5<br />

4<br />

6<br />

1<br />

client PC<br />

or workstation<br />

NT PDC OR BDC<br />

LDAP SERVER<br />

RADIUS SERVER<br />

DEFENDER SEC.<br />

SERVER (DSS)<br />

ACE SERVER<br />

SAFEWORD<br />

SERVER<br />

database<br />

database<br />

database<br />

database<br />

database<br />

database<br />

Note: The numbers in this<br />

figure correspond to the<br />

process overview steps<br />

listed on the next page.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!