01.01.2013 Views

Web Gateway 7.1.5 Product Guide - McAfee

Web Gateway 7.1.5 Product Guide - McAfee

Web Gateway 7.1.5 Product Guide - McAfee

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

5<br />

Authentication and access management<br />

Standard authentication<br />

Authorize<br />

The Authorize rule set allows only requests from users who are members of a whitelisted user group.<br />

Nested library rule set — Authorize<br />

Criteria — Always<br />

Cycle — Requests (and IM)<br />

The rule set contains the following rule:<br />

Only allow users of Allowed User Groups<br />

Authentication.UserGroups none in list Allowed User Groups –> Block<br />

The rule uses the Authentication.UserGroups property to allow only users access who are members<br />

of a group on the specified whitelist. If a user is not in one of the groups on the list, the rule<br />

applies and stops processing of all rules. The request is not passed on to a web server and blocked<br />

this way.<br />

The action settings specify that a notification is sent to the requesting user. Processing continues<br />

when the next request is received.<br />

Implement an authentication method<br />

If you do not want to keep the User Database authentication method, which is used by default in a rule<br />

of the Authentication and Authorize rule set, you can implement a different authentication method,<br />

such as NTLM, LDAP, and others. This section tells you how to modify the rule to implement this<br />

change.<br />

To implement a different authentication method:<br />

1 Go to Policy | Rule Sets.<br />

2 On the rule sets tree, go to the rule set that contains rules for authenticating users, for example, the<br />

default Authentication and Authorize rule set and select the nested Authenticate with User<br />

Database rule set. The rules of the nested rule set appear on the settings pane.<br />

3 Select the rule Authenticate with User Database and in the rule criteria click User Database.<br />

The Edit Settings window opens.<br />

4 From the list provided under Authentication Method, select an authentication method, for<br />

example, NTLM.<br />

5 Configure common and specific parameters for the selected method as needed. When you are done,<br />

click OK to close the window.<br />

6 Click Save Changes.<br />

Note: It is recommended that after changing the authentication method, you rename the settings of the<br />

Authentication module, the authentication rule, and the nested rule set, accordingly.<br />

For example, after selecting NTLM, rename the settings to NTLM and both the rule and the nested rule set<br />

to Authenticate with NTLM.<br />

Instead of renaming the default settings, you can also keep several settings with different names and<br />

parameter values for the Authentication module<br />

For more information on the settings you can configure for authenticating users, see Module for<br />

authenticating users.<br />

126 <strong>McAfee</strong> <strong>Web</strong> <strong>Gateway</strong> <strong>7.1.5</strong> <strong>Product</strong> <strong>Guide</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!