
182
Chapter 18: Managing User Authentication
To create a user, follow these steps:
1.
Enter the user ID and full user name.
2. If you want to assign the user to a group, enter the name of the group. If the group
does not exist, creating the user creates the group. If a group administrator creates
users, those users will inherit the group information.
3. Enter the strong-authentication protocol for this user. Current options are selectable
from the selection box.
Warning:
Do not use the reusable passwords option for authentication from
untrusted networks. Reusable passwords are vulnerable to password sniffers and
are easy to crack. This feature is provided for convenience and audit capability
only.
4. Enter the authentication information for the user if applicable. (In some cases, this
will be a password.)
5. Verify the authentication information by entering it again.
6. Make the information active by saving these changes (in gauntlet-admin).
Creating Default Users
Creating a default user allows you to authenticate users without manually creating
entries for every user in the Gauntlet authentication database. Note that this option is
only available for:
•
Safeword Authentication Server
•
SecurID
You can only have one default user. When a user logs in and the authentication server
does not find the information in the Gauntlet authentication database, the authentication
server sends the user information to the remote authentication server. The
authentication server also creates a record for that user in the Gauntlet authentication
database.
To create a default user:
1.
Enter default as the userid.
2. Enter the name of a group to assign the user to a group, if desired. If the group
does not exist, creating the user creates the group. If a group administrator creates
users, those users will inherit the group information.
Summary of Contents for Gauntlet
Page 1: ...Gauntlet for IRIX Administrator s Guide Document Number 007 2826 004 ...
Page 16: ......
Page 26: ......
Page 27: ...PART ONE Understanding the Gauntlet Internet Firewall I ...
Page 28: ......
Page 43: ...PART TWO Configuring and Using Proxies II ...
Page 44: ......
Page 50: ......
Page 56: ......
Page 64: ......
Page 72: ......
Page 94: ......
Page 109: ...PART THREE Administering General Gauntlet Firewall Services III ...
Page 110: ......
Page 140: ......
Page 147: ...Introductory Management Form 121 Figure 17 4 Gauntlet Introductory Management Form 2 of 3 ...
Page 155: ...Routing Configuration Form 129 Figure 17 8 Routing Configuration Form ...
Page 163: ...Proxy Servers Configuration Form 137 Figure 17 11 Proxy Servers Configuration Form 2 of 3 ...
Page 170: ...144 Chapter 17 The Graphical Management Interface Figure 17 13 DNS Configuration Form 1 of 2 ...
Page 171: ...DNS Configuration Form 145 Figure 17 14 DNS Configuration Form 2 of 2 ...
Page 177: ...Sendmail on Gauntlet Servers 151 Figure 17 15 Sendmail Configuration Form ...
Page 187: ...Logfiles and Reports Configuration Form 161 Figure 17 20 Reports and Logfiles Form 1 of 2 ...
Page 191: ...Authorizing Users Form 165 Figure 17 22 Authorizing Users Form ...
Page 192: ...166 Chapter 17 The Graphical Management Interface Figure 17 23 Add User Form ...
Page 214: ......
Page 232: ......
Page 233: ...Appendixes IV ...
Page 234: ......
Page 294: ......
Page 305: ......