18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Users, groups,<br />

and<br />

authentication<br />

Chapter 10: Setting Up Authentication<br />

Users, groups, and authentication<br />

The numbers in Figure 129 represent the sequence <strong>of</strong> events that occur when<br />

a remote user requests a network connection through the <strong>Sidewinder</strong> <strong>G2</strong>.<br />

These events are described below. In this scenario, the user is authenticated<br />

using SafeWord PremierAccess, which implements a challenge-response<br />

authentication process. (Note that the process is different for other<br />

authentication methods.)<br />

1 A user tries to make a network connection via Telnet or FTP.<br />

2 The <strong>Sidewinder</strong> <strong>G2</strong> checks the active rules to determine whether the<br />

connection between the source and destination addresses is allowed and<br />

to determine which warder to use.<br />

3 If the connection is allowed, the proxy contacts the appropriate warder in<br />

the <strong>Sidewinder</strong> <strong>G2</strong>.<br />

4 The warder passes the log in request to the appropriate authentication<br />

server. The server checks the data base to verify the user’s log in name is<br />

registered and then generates a log in prompt.<br />

5 The log in challenge is sent to the user. Using client s<strong>of</strong>tware or a hardware<br />

authenticator, the user types in the proper response to the prompt.<br />

6 The <strong>Sidewinder</strong> <strong>G2</strong> sends the response to the authentication server. The<br />

authentication server checks the response and informs the <strong>Sidewinder</strong> <strong>G2</strong><br />

to either accept or reject the log in request.<br />

As a <strong>Sidewinder</strong> <strong>G2</strong> administrator, you are responsible for configuring the<br />

<strong>Sidewinder</strong> <strong>G2</strong> to work with the desired authentication server. The first step is<br />

identifying the users that will need authentication services on the <strong>Sidewinder</strong><br />

<strong>G2</strong>. You can set up authentication on a user-by-user basis or create user<br />

groups. A user group is a mechanism that allows you to identify multiple users<br />

by a single name, making it easier to configure authentication requirements for<br />

your network.<br />

Note: The procedures to add users to the user database and set up user groups<br />

are described in Chapter 5.<br />

After defining and creating the appropriate user groups for your site, you need<br />

to configure the authentication method(s) that your site will use. The following<br />

section describes what needs to be done to configure the <strong>Sidewinder</strong> <strong>G2</strong> for<br />

authenticating users or administrators.<br />

283

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!