Managing Users
183
3. Enter the strong-authentication protocol for this user. Valid options are:
4. Leave the password for this user empty. The authentication server uses the value
registered with the appropriate server.
5. Make the information active by saving these changes (in the gauntlet-admin and
gauntlet-gui menuing systems) or exiting the authentication server.
Creating Users with Access Key II
To create a user with Access Key II authentication, use this procedure:
1.
Create a key for the Access Key II according to the documentation included with the
key. This creates the keyfile.log file which contains the key.
2. Log in to the firewall and become root.
3. Copy this file to a temporary directory (such as/tmp/vasco) on the firewall.
4. Load the key information into the user authentication management system using
the key initialization tool (/usr/etc/vasco_init)
firebird# vasco_init /tmp/vasco/keyfile.long
This tool creates a user in the authentication management system and loads the key
for this user. It creates the user name by prepending the letter i to the serial number
for that Access Key II. This user is initially disabled.
If you are using multiple authentication servers, or are running your authentication
server under a different name, consult the vasco_init(8) reference page for
additional command line options.
5. Note the user name that the initialization program displays so that you can change
it to something easier for the user to remember.
record loaded for user: i2-0005899-4
6. Use and authentication management tool to change the name of the user:
authmgr->rename i2-0005899-for john ‘John Whorfin’
protocol
value
Safeword Authentication Server
Safeword
SecurID
SecurID
Summary of Contents for Gauntlet
Page 1: ...Gauntlet for IRIX Administrator s Guide Document Number 007 2826 004 ...
Page 16: ......
Page 26: ......
Page 27: ...PART ONE Understanding the Gauntlet Internet Firewall I ...
Page 28: ......
Page 43: ...PART TWO Configuring and Using Proxies II ...
Page 44: ......
Page 50: ......
Page 56: ......
Page 64: ......
Page 72: ......
Page 94: ......
Page 109: ...PART THREE Administering General Gauntlet Firewall Services III ...
Page 110: ......
Page 140: ......
Page 147: ...Introductory Management Form 121 Figure 17 4 Gauntlet Introductory Management Form 2 of 3 ...
Page 155: ...Routing Configuration Form 129 Figure 17 8 Routing Configuration Form ...
Page 163: ...Proxy Servers Configuration Form 137 Figure 17 11 Proxy Servers Configuration Form 2 of 3 ...
Page 170: ...144 Chapter 17 The Graphical Management Interface Figure 17 13 DNS Configuration Form 1 of 2 ...
Page 171: ...DNS Configuration Form 145 Figure 17 14 DNS Configuration Form 2 of 2 ...
Page 177: ...Sendmail on Gauntlet Servers 151 Figure 17 15 Sendmail Configuration Form ...
Page 187: ...Logfiles and Reports Configuration Form 161 Figure 17 20 Reports and Logfiles Form 1 of 2 ...
Page 191: ...Authorizing Users Form 165 Figure 17 22 Authorizing Users Form ...
Page 192: ...166 Chapter 17 The Graphical Management Interface Figure 17 23 Add User Form ...
Page 214: ......
Page 232: ......
Page 233: ...Appendixes IV ...
Page 234: ......
Page 294: ......
Page 305: ......