30.01.2015 Views

Administrator's Guide - Kerio Software Archive

Administrator's Guide - Kerio Software Archive

Administrator's Guide - Kerio Software Archive

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

11.1 Firewall User Authentication<br />

This authentication method is not recommended for cases where hosts are used by<br />

multiple users (user’s identity might be misused easily).<br />

• Redirection — when accessing any website (unless access to this page is explicitly<br />

allowed to unauthenticated users — see chapter 13.2).<br />

Login by re-direction is performed in the following way: user enters URL pages that<br />

he/she intends to open in the browser. <strong>Kerio</strong> Control detects whether the user has<br />

already authenticated. If not, <strong>Kerio</strong> Control will re-direct the user to the login page<br />

automatically. After a successful login, the user is automatically re-directed to the<br />

requested page or to the page including the information where the access was denied.<br />

• Using NTLM — if Internet Explorer or Firefox/SeaMonkey is used and the user<br />

is authenticated in a Windows NT domain or Active Directory, the user can be<br />

authenticated automatically (the login page will not be displayed). For details, see<br />

chapter 25.3.<br />

User authentication advanced options<br />

Login/logout parameters can be set on the Authentication Options tab under Users and Groups<br />

→ Users.<br />

Figure 11.1<br />

User Authentication Options<br />

161

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!