14: User Authentication
EMG™ Edge Management Gateway User Guide
310
Kerberos
Kerberos is a network authentication protocol that provides strong authentication for client/server
applications by using secret-key cryptography.
The system administrator can configure the EMG to use Kerberos to authenticate users attempting
to log in using the Web, Telnet, SSH, or the console port.
Users who are authenticated through Kerberos are granted device port access through the port
permissions on this page.
All Kerberos users are members of a group that has predefined user rights associated with it. You
can add additional user rights that are not defined by the group.
To configure the EMG to use Kerberos to authenticate users:
1. Click the
User Authentication
tab and select the
Kerberos
option. The following page
displays.
Figure 14-8 User Authentication > Kerberos
Summary of Contents for EMG Series
Page 100: ...7 Networking EMG Edge Management Gateway User Guide 100 Figure 7 5 Network Wireless Settings...
Page 353: ...15 Maintenance EMG Edge Management Gateway User Guide 353 Figure 15 12 About EMG...
Page 474: ...EMG Edge Management Gateway User Guide 474 Figure E 3 EU Declaration of Conformity...
Page 475: ...EMG Edge Management Gateway User Guide 475 Figure E 4 EU Declaration of Conformity continued...