
User Interface
R&S
®
GP-U/GP-E/GP-S/GP-T
34
User Manual 3646.3836.02 ─ 01
d) On the "Kerberos" tab, click the "Create Kerberos Key" button to generate the
Kerberos key.
The Active Directory is queried to validate the specified AD user and to obtain the
relevant information, such as the Kerberos key version number. With that informa-
tion, the gateprotect Firewall is able to generate a valid Kerberos key locally.
6. Activating SSO on the gateprotect Firewall
To enable SSO on the gateprotect Firewall, perform the following steps:
a) On the "Kerberos" tab, select the "Active" checkbox.
b) Click "Save" to store your settings.
7. Preparing the Windows client
The gateprotect Firewall installation medium contains the
UAClientSSO
directory
with three files:
● the
UAClientSSOSetup.exe
setup program for the SSO client
This setup file installs the
UAClientSSO.exe
under
C:\Program
Files\R&S Cybersecurity\UA Client\3.0\UAClientSSO.exe
.
● the
UAClientSSO.exe
application
The file needs two parameters which you have to set when starting it:
1) the host name of the gateprotect Firewall (for more information, see
Authentication / Directory Service Settings"
2) the IP address of the gateprotect Firewall in the network of the client com-
puter.
For example, if the host name of the gateprotect Firewall is
fw96
and its IP
address in the network of the client computer is
192.168.0.1
, the target path
for the installation of the UA SSO client is
C:\Program Files\R&S
Cybersecurity\UA Client\3.0\UAClientSSO.exe fw96
192.168.0.1
.
● the
UAClientSSO.msi
Microsoft installer file
This file serves for the distribution of the client through a software distribution,
also requiring the two parameters host name and IP address. However, you
cannot pass any parameters to the MSI file. The easiest solution is to pass the
parameters via a link.
Tip:
The gateprotect User Authentication Client can be started from a network
drive (for example NETLOGON) and does not necessarily have to be installed on
all Windows clients within your network.
Users
Just like computers, users and LDAP groups can be set up on the desktop as individ-
ual users or user groups.
For these desktop objects, you then define the rules which are to be assigned to the
users as soon as they log on. If users log on from a computer to which certain rules are
assigned, the rules of this computer and their personal rules are applied to these
users. You can select users and LDAP groups from the local user database on the
gateprotect Firewall and from the openLDAP or Active Directory authentication server
and add them to the user groups on the desktop. There is also a special "Default User
Menu Reference