
180
Chapter 18: Managing User Authentication
strongly authenticate themselves to login, using login-sh(1M), which supports any of the
authentication mechanisms aforementioned.
Configuring Authentication Management System Rules
If you are using the Gauntlet Firewall default configuration, you do not need to modify
the configuration rules for the user authentication management system. If you have
chosen a different port or a different location for your database, you must modify
/usr/gauntlet/config/template.netperm-table to reflect your configuration. See Appendix B
for more information on authentication manager options, netperm-table options, and
order of precedence.
Verifying Your Installation
Verify your installation by accessing the firewall from a host on the outside network.
To verify an installation using TELNET:
1.
On a host on the outside network, TELNET to the firewall.
2. At the TELNET proxy user name prompt, enter a user name you have created.
3. At the TELNET proxy password prompt, enter the appropriate password or
response for the user you have created.
4. When you see the “Login Accepted” banner, you have verified your installation.
You are now ready to begin creating groups, adding users and assigning them to
groups. These tasks are described in the sections on managing groups and users in
this chapter.
Managing Groups
As with IRIX systems, the Gauntlet user authentication management system makes use
of groups. Groups allow you to permit or deny services based on groups, rather than
individual user names. For example, you can configure the TELNET proxy to require
authentication for everyone in the group “sales”. See “Extended Permissions” in the
authserv(1M) reference page for details.
Summary of Contents for Gauntlet
Page 1: ...Gauntlet for IRIX Administrator s Guide Document Number 007 2826 004 ...
Page 16: ......
Page 26: ......
Page 27: ...PART ONE Understanding the Gauntlet Internet Firewall I ...
Page 28: ......
Page 43: ...PART TWO Configuring and Using Proxies II ...
Page 44: ......
Page 50: ......
Page 56: ......
Page 64: ......
Page 72: ......
Page 94: ......
Page 109: ...PART THREE Administering General Gauntlet Firewall Services III ...
Page 110: ......
Page 140: ......
Page 147: ...Introductory Management Form 121 Figure 17 4 Gauntlet Introductory Management Form 2 of 3 ...
Page 155: ...Routing Configuration Form 129 Figure 17 8 Routing Configuration Form ...
Page 163: ...Proxy Servers Configuration Form 137 Figure 17 11 Proxy Servers Configuration Form 2 of 3 ...
Page 170: ...144 Chapter 17 The Graphical Management Interface Figure 17 13 DNS Configuration Form 1 of 2 ...
Page 171: ...DNS Configuration Form 145 Figure 17 14 DNS Configuration Form 2 of 2 ...
Page 177: ...Sendmail on Gauntlet Servers 151 Figure 17 15 Sendmail Configuration Form ...
Page 187: ...Logfiles and Reports Configuration Form 161 Figure 17 20 Reports and Logfiles Form 1 of 2 ...
Page 191: ...Authorizing Users Form 165 Figure 17 22 Authorizing Users Form ...
Page 192: ...166 Chapter 17 The Graphical Management Interface Figure 17 23 Add User Form ...
Page 214: ......
Page 232: ......
Page 233: ...Appendixes IV ...
Page 234: ......
Page 294: ......
Page 305: ......