18.07.2013 Views

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Configuring authentication services<br />

— SNK/Symantec Defender—To configure SecureNet (SNK)/<br />

Symantec Defender authentication, see “Setting up SecureNet<br />

Key (SNK) authentication” on page 9-24.<br />

— Windows Domain—To configure Windows Domain<br />

authentication, see “Setting up Windows Domain<br />

authentication” on page 9-26.<br />

Enable/disable an authentication method—A check mark appears in<br />

front <strong>of</strong> authentication methods that are currently enabled. To<br />

enable an authentication method, select the appropriate check box<br />

under the Enable Warders area. To disable an authentication<br />

method, deselect the appropriate check box in the Enable Warders<br />

area.<br />

Note: If you attempt to enable an authentication method that has not yet been<br />

configured, you will be prompted to configure the method first.<br />

Manage locked out users—To configure the <strong>Sidewinder</strong> <strong>G2</strong> to<br />

lockout a user if the number <strong>of</strong> failed authentication attempts<br />

reaches the specified lockout threshold, or to manage users who<br />

are currently locked out, click Authentication Failure Locked Out Users<br />

and see “Configuring and managing the locked out users” on page<br />

9-14 for details.<br />

View SSO Authenticated Users—To view users currently in the SSO<br />

authenticated cache, click Current SSO Authenticated Users, and see<br />

“Viewing currently authenticated SSO users” on page 9-15.<br />

Configure external authorization roles—The External Authorization Roles<br />

list displays the roles defined by an external authentication<br />

program (for example, SafeWord PremierAccess or LDAP/Active<br />

Directory) that can be used within a the <strong>Sidewinder</strong> <strong>G2</strong> proxy rule.<br />

Use the New, Modify, and Delete buttons to manage this list. If you<br />

click New or Modify under the External Authorization Roles field,<br />

the New (or Modify) External Authorization Roles window<br />

appears.<br />

Note: See “Creating proxy rules” on page 7-4 for information on how these roles are<br />

used in a proxy rule. (You may need to consult the administrator <strong>of</strong> your particular<br />

authentication program for the names <strong>of</strong> the roles to add to this list.)<br />

Setting Up Authentication 9-13

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!