253
Limiting user access
Authenticating with an external authentication server
You can use any text editor to create this file. Once it is created, and saved, go to that file, right-click
and rename it without a file extension.
Prerequisites
Complete the following tasks before beginning this procedure:
■
“Creating the pkimpuser import file”
To import users from a pkimpuser file
1
In the SGMI, under the File menu, click
Import Users
.
2
In the Import Users dialog box, browse to your pkimpuser file, and then click
Import Users
.
3
Optionally, do one of the following:
■
To save your configuration now and activate later, on the toolbar, click
Save
.
■
To activate your changes now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
Related information
None.
Authenticating with an external authentication server
In addition to providing its own internal authentication server, the security gateway lets users
authenticate with supported external authentication servers. This lets you leverage your existing user
authentication information and may provide a higher level of security, as some external systems use
two-factor or challenge-response authentication mechanisms.
You authenticate users against an external authentication system by doing the following:
■
Creating authentication server records
■
Configuring an authentication scheme
■
Adding an authentication scheme to a rule
Note:
Any supported external authentication system that you elect to use should already be
configured. For instructions on setting up and populating your external authentication system, please
consult your product’s documentation.
Creating authentication server records
To authenticate using an external authentication server, you must create an authentication record for
the server that identifies how the security gateway accesses the server.
The security gateway supports the following external authentication systems:
■
Microsoft’s Active Directory authentication
■
Lightweight Directory Access Protocol (LDAP) authentication
■
Remote Authentication Dial-In User Service (RADIUS) authentication
jondoe7 crypt onedayAtAtime QA Y {haq114021999} jondoe7 {paqo123uiui9uu9i}
jondoe8 plaintext atmospherics!! principal Y {haq114021999} jondoe8 {paqo123uiui9uu9i}
jondoe9 plaintext whattodo2435464 marketing Y {haq114021999} jondoe9 {paqo123uiui9uu9i}
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...