30.01.2015 Views

Administrator's Guide - Kerio Software Archive

Administrator's Guide - Kerio Software Archive

Administrator's Guide - Kerio Software Archive

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 11<br />

User Authentication<br />

<strong>Kerio</strong> Control allows administrators to monitor connections (packet, connection, web pages or<br />

FTP objects and command filtering) related to each user. The username in each filtering rule<br />

represents the IP address of the host(s) from which the user is connected (i.e. all hosts the<br />

user is currently connected from). This implies that a user group represents all IP addresses<br />

its members are currently connected from.<br />

Besides access restrictions, user authentication can be used also for monitoring of their<br />

activities in the <strong>Kerio</strong> StaR interface (see chapter 21), in logs (see chapter 22), in the list<br />

of opened connections (see chapter 19.2) and in the overview of hosts and users (see<br />

chapter 19.1). If there is no user connected from a certain host, only the IP address of the<br />

host will be displayed in the logs and statistics. In statistics, this host’s traffic will be included<br />

in the group of not logged in users.<br />

11.1 Firewall User Authentication<br />

Any user with their own account in <strong>Kerio</strong> Control can authenticate at the firewall (regardless<br />

their access rights). Users can connect:<br />

• Manually — by opening the <strong>Kerio</strong> Control web interface in their browser<br />

https://server:4081/ or http://server:4080/<br />

(the name of the server is only an example — see chapter 12).<br />

It is also possible to authenticate for viewing of the web statistics (see chapter 21) at<br />

https://server:4081/star or http://server:4080/star<br />

Note: Login to the Administration interface at<br />

https://server:4081/admin or http://server:4080/admin<br />

is not equal to user authentication at the firewall (i.e. the user does not get<br />

authenticated at the firewall by the login)!<br />

• Automatically — IP addresses of hosts from which they will be authenticated<br />

automatically can be associated with individual users. This actually means that<br />

whenever traffic coming from the particular host is detected, <strong>Kerio</strong> Control assumes<br />

that it is currently used by the particular user , and the user is considered being<br />

authenticated from the IP address. However, users may authenticate from other hosts<br />

(using the methods described above).<br />

IP addresses for automatic authentication can be set during definition of user account<br />

(see chapter 16.1).<br />

160

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!