18.07.2013 Views

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

C HAPTER 9<br />

Setting Up Authentication<br />

About this chapter This chapter describes the methods that are available to authenticate<br />

<strong>Sidewinder</strong> <strong>G2</strong> users and administrators. This chapter includes<br />

information on how to set up the <strong>Sidewinder</strong> <strong>G2</strong> to authenticate login,<br />

Telnet, FTP, Web, SOCKS5, secure shell (SSH), and VPN sessions. This<br />

chapter also provides information on configuring single sign-on<br />

(SSO). The following topics are covered:<br />

Authentication<br />

overview<br />

“Authentication overview” on page 9-1<br />

“Supported authentication methods” on page 9-5<br />

“Authentication process overview” on page 9-9<br />

“Users, groups, and authentication” on page 9-11<br />

“Configuring authentication services” on page 9-11<br />

“Configuring SSO” on page 9-27<br />

“Setting up authentication for services” on page 9-30<br />

“Setting up authentication for Web sessions” on page 9-32<br />

“Setting up authentication for administrators” on page 9-33<br />

“Allowing users to change their passwords” on page 9-34<br />

“How users can change their own password” on page 9-36<br />

In general, authentication refers to a process that validates a person’s<br />

identity before he or she is allowed to log in to a network server.<br />

Depending on the authentication method used, a person must provide<br />

a user name and valid password and/or a special passcode or<br />

personal identification number (PIN) before being logged on to a<br />

server. If a user enters an invalid password, passcode, or PIN the log<br />

in request is denied.<br />

There are two basic <strong>Sidewinder</strong> <strong>G2</strong> authentication scenarios: proxy<br />

authentication and <strong>Sidewinder</strong> <strong>G2</strong> administrator authentication. The<br />

following sections describe each scenario.<br />

9<br />

Setting Up Authentication 9-1

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!