01.01.2013 Views

Web Gateway 7.1.5 Product Guide - McAfee

Web Gateway 7.1.5 Product Guide - McAfee

Web Gateway 7.1.5 Product Guide - McAfee

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

5<br />

Authentication and access management<br />

Instant messaging authentication<br />

Instant messaging authentication<br />

Instant messaging service (IM service) users can be authenticated on the appliance according to the<br />

rules of an appropriate rule set. This section describes the rules in a rule set for instant messaging<br />

authentication and the settings for the modules that are called by these rules.<br />

When the appliance is configured to run as a proxy under an instant messaging protocol, it can also<br />

authenticate users who send chat messages and files from clients that are connected to the appliance.<br />

A rule set with rules for authenticating users of an instant messaging service must be implemented to<br />

control the authentication. You can import the IM Authentication rule set from the rule set library or<br />

configure a rule set of your own.<br />

You can also configure the settings the Authentication module runs with when used by the rules for<br />

instant messaging authentication, as well as the settings of the File System Logging module when it<br />

handles logging activities according to the rules for instant messaging authentication.<br />

For more information, see Import a rule set and IM Authentication.<br />

IM Authentication<br />

This section describes the IM Authentication library rule set. The rules in this rule set control the<br />

authentication of users of an instant messaging service sending chat messages and files from clients<br />

that are connected to the appliance.<br />

For general information on understanding and handling rules, see Rules and rule sets.<br />

Library rule set — IM Authentication<br />

Criteria — Always<br />

Cycles — Requests (and IM), responses, embedded objects<br />

The following rule sets are nested in this rule set:<br />

• IM Authentication Server<br />

• IM Proxy<br />

IM Authentication Server<br />

This nested rule set handles authentication for instant messaging users under the User Database<br />

method.<br />

Nested library rule set — IM Authentication Server<br />

Criteria — Authentication.IsServerRequest equals true<br />

Cycle — Requests (and IM), responses, embedded objects<br />

The rule set criteria specifies that the rule set applies when authentication has been requested for a<br />

user of an instant messaging service.<br />

The rule set contains the following rules:<br />

Authenticate clients against user database<br />

Authentication.Authenticate equals false –><br />

Authenticate<br />

The rule uses the Authentication.Authenticate property to check whether a user who sends a chat<br />

message or file under an instant messaging protocol is authenticated. The settings that follow the<br />

property in the rule criteria specify the User Database method for this authentication.<br />

If a user is not authenticated under this method, processing stops and a message is displayed<br />

asking the user to authenticate. Processing continues when the next user request is received.<br />

140 <strong>McAfee</strong> <strong>Web</strong> <strong>Gateway</strong> <strong>7.1.5</strong> <strong>Product</strong> <strong>Guide</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!