18.07.2013 Views

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Authentication process overview<br />

Figure 9-1.<br />

Authentication servers<br />

supported by the<br />

<strong>Sidewinder</strong> <strong>G2</strong><br />

9-10 Setting Up Authentication<br />

3<br />

<strong>Sidewinder</strong> <strong>G2</strong><br />

proxy<br />

active rules<br />

Windows Domain<br />

warder<br />

LDAP warder<br />

RADIUS warder<br />

SNK warder<br />

SecurID warder<br />

SafeWord<br />

warder<br />

password warder<br />

user database<br />

2 5<br />

4<br />

6<br />

The numbers in Figure 9-1 represent the sequence <strong>of</strong> events that<br />

occur when a remote user requests a network connection through the<br />

<strong>Sidewinder</strong> <strong>G2</strong>. These events are described below. In this scenario,<br />

the user is authenticated using SafeWord PremierAccess, which<br />

implements a challenge-response authentication process. (Note that<br />

the process is different for other authentication methods.)<br />

1<br />

client PC<br />

or workstation<br />

NT PDC OR BDC<br />

LDAP SERVER<br />

RADIUS SERVER<br />

DEFENDER SEC.<br />

SERVER (DSS)<br />

ACE SERVER<br />

SAFEWORD<br />

SERVER<br />

database<br />

database<br />

database<br />

database<br />

database<br />

database<br />

Note: The numbers in this<br />

figure correspond to the<br />

process overview steps listed<br />

on the next page.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!