
176
Chapter 18: Managing User Authentication
Authentication Editor
You can edit, add, or delete users from the gauntlet-admin Authentication page.
Authentication Loader
This program (authload) loads records in bulk into the database, and initializes the
database.
Authentication Dumper
This program (authdump) exports the contents of the database to an ASCII file, for easy
backup.
Understanding Strong Authentication
The Gauntlet firewall supports a variety of strong authentication options. The
authentication management system understands the types of passwords that these
systems use, and provides a consistent user interface to these systems.
Currently supported systems are shown below. Consult the system requirements card in
your Gauntlet firewall package for the latest information on supported versions of the
these products.
Access Key II
This system, from VASCO Data Security, uses a random challenge password. When the
firewall prompts for authentication it provides a challenge. The user enters their PIN (if
one is required) and the challenge into the Access Key II. The Access Key II responds
with a password. The user enters this value at the Gauntlet prompt, and the Gauntlet
authentication server verifies this value.
APOP
This system, supported APOP compliant (mail) applications, uses an MD5 secure hash
algorithm. The application generates a random challenge and includes it as part of the
initial banner.
Summary of Contents for Gauntlet
Page 1: ...Gauntlet for IRIX Administrator s Guide Document Number 007 2826 004 ...
Page 16: ......
Page 26: ......
Page 27: ...PART ONE Understanding the Gauntlet Internet Firewall I ...
Page 28: ......
Page 43: ...PART TWO Configuring and Using Proxies II ...
Page 44: ......
Page 50: ......
Page 56: ......
Page 64: ......
Page 72: ......
Page 94: ......
Page 109: ...PART THREE Administering General Gauntlet Firewall Services III ...
Page 110: ......
Page 140: ......
Page 147: ...Introductory Management Form 121 Figure 17 4 Gauntlet Introductory Management Form 2 of 3 ...
Page 155: ...Routing Configuration Form 129 Figure 17 8 Routing Configuration Form ...
Page 163: ...Proxy Servers Configuration Form 137 Figure 17 11 Proxy Servers Configuration Form 2 of 3 ...
Page 170: ...144 Chapter 17 The Graphical Management Interface Figure 17 13 DNS Configuration Form 1 of 2 ...
Page 171: ...DNS Configuration Form 145 Figure 17 14 DNS Configuration Form 2 of 2 ...
Page 177: ...Sendmail on Gauntlet Servers 151 Figure 17 15 Sendmail Configuration Form ...
Page 187: ...Logfiles and Reports Configuration Form 161 Figure 17 20 Reports and Logfiles Form 1 of 2 ...
Page 191: ...Authorizing Users Form 165 Figure 17 22 Authorizing Users Form ...
Page 192: ...166 Chapter 17 The Graphical Management Interface Figure 17 23 Add User Form ...
Page 214: ......
Page 232: ......
Page 233: ...Appendixes IV ...
Page 234: ......
Page 294: ......
Page 305: ......