01.01.2013 Views

Web Gateway 7.1.5 Product Guide - McAfee

Web Gateway 7.1.5 Product Guide - McAfee

Web Gateway 7.1.5 Product Guide - McAfee

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

5<br />

Authentication and access management<br />

Standard authentication<br />

Standard authentication<br />

To authenticate users on the appliance information is retrieved mainly from internal and external<br />

databases. This section describes the rules that control standard authentication and the settings for the<br />

module that handles the authentication process.<br />

Differerent methods can be configured on the appliance for authenticating users. With each of them,<br />

authentication information is retrieved in a different way.<br />

• NTLM — Uses a database on a Windows domain server<br />

• NTLM Agent — Uses an external agent on a Windows-based system for applying the NTLM<br />

authentication method<br />

• User database — Uses an internal database on the appliance<br />

• LDAP — Uses a database on an LDAP server<br />

• Novell eDirectory — Uses data from a directory on a server that takes the role of an LDAP server<br />

• RADIUS — Uses a database on a RADIUS server<br />

• Kerberos — Uses a database on a Kerberos server<br />

• SSL client certificate authentication — Uses a certificate that a client sends in SSL-secured<br />

communication<br />

• Authentication server — Uses a database on another external server<br />

An authentication rule includes settings for the module that retrieves the information. By configuring<br />

these settings you can specify which method should be used.<br />

Rules for authenticating users<br />

Rules for authenticating users are contained in an authentication rule set. This section describes an<br />

authentication rule set and explains how to modify one if its rules to implement a particular<br />

authentication method.<br />

An authentication rule set might not be implemented on the appliance after the initial setup, but you<br />

can import one from the rule set library.<br />

Note: If the library contains no rule set for authenticating user, it can still be part of the default system of rule<br />

sets. As usual, you can also configure an authentication rule set with rules of your own.<br />

Authenticate and Authorize<br />

This section describes the Authenticate and Authorize library rule set. The rules in this rule set control<br />

the authentication of users and allow only authorized users access to the web.<br />

Library rule set — Authenticate and Authorize<br />

Criteria — Connection.Protocol equals HTTP OR Connection.Protocol equals HTTPS<br />

Cycle — Requests (and IM)<br />

The rule set criteria specifies that the rule set applies when the protocol used on the connection for<br />

sending a request is either HTTP or HTTPs.<br />

The following rule sets are nested in this rule set:<br />

• Authenticate with User Database<br />

• Authorize<br />

124 <strong>McAfee</strong> <strong>Web</strong> <strong>Gateway</strong> <strong>7.1.5</strong> <strong>Product</strong> <strong>Guide</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!