01.01.2013 Views

Web Gateway 7.1.5 Product Guide - McAfee

Web Gateway 7.1.5 Product Guide - McAfee

Web Gateway 7.1.5 Product Guide - McAfee

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Authentication and access management<br />

Cookie authentication 5<br />

IM Logging<br />

Settings for the File System Logging module specifying the log file for logging activities related to<br />

instant messaging authentication and the way this log file is maintained<br />

Meaning and usage of these settings are the same as for other settings of the File System Logging<br />

Module.<br />

The settings include the default log file name. For the log file that entries on instant messaging<br />

authentication are written into, this name is im.log.<br />

For more information, see File System Logging Settings.<br />

Cookie authentication<br />

Users can be authenticated by cookies once they have successfully authenticated on the appliance. This<br />

section tells you how to configure cookie authentication. It describes a rule set and the settings of the<br />

module for this authentication.<br />

The rules in a rule set for cookie authentication say that a cookie is stored for a successfully<br />

authenticated user and what should be done when this user sends another request. Typically, the user<br />

does then not need to authenticate again.<br />

Note: The size of a cookie grows with the user information it contains. This can cause a problem for the<br />

browser you use to log on to the appliance.<br />

The Mozilla Firefox browser version 3.5 or higher does not support cookies bigger than 32 KB. So cookie<br />

authentication might not work for a user who is a member of many user groups.<br />

A cookie authentication rule set is not implemented after the initial setup of the appliance, but you can<br />

import one from the rule set library or create a rule set of your own.<br />

Like other authentication activities, cookie authentication is handled by the Authentication module.<br />

When the rule set for cookie authentication is imported from the library, settings for this module are<br />

also implemented.<br />

Cookie Authentication (rule set)<br />

This section describes the Cookie Authentication library rule set. The rules in this rule set control teh<br />

use of cookies for authenticating users who have already been authenticated successfully<br />

For general information on understanding and handling rules, see Rules and rule sets.<br />

i<br />

Library rule set — Cookie Authentication<br />

Criteria — Always<br />

Cycle — Requests (and IM)<br />

The following rule sets are nested in this rule set:<br />

• Cookie Authentication at HTTP(S) proxy<br />

• Set Cookie for Authenticated Clients<br />

• Authenticate Clients With Authentication Server<br />

• Cookie Authentication at Authentication Server<br />

• Authentication Server Request<br />

<strong>McAfee</strong> <strong>Web</strong> <strong>Gateway</strong> <strong>7.1.5</strong> <strong>Product</strong> <strong>Guide</strong> 143

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!