260
Limiting user access
Authenticating with an external authentication server
3
In the SecurID Properties dialog box, on the General tab, do the following:
4
Optionally, on the Description tab, type a more detailed description than you typed in the Caption
text box.
5
Click
OK
.
6
Optionally, do one of the following:
■
To save your configuration now and activate later, on the toolbar, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
7
After defining the SecurID authentication server, you can use it in the following ways:
■
Identify the server to be used for authentication in an authentication scheme.
■
Use the server as the authentication server in a clientless VPN role.
Related information
For further information related to this topic, see the following:
■
“SecurID Properties—General tab”
■
“SecurID Properties—Description tab”
■
“Configuring an authentication scheme”
■
“Creating and assigning roles”
Configuring an authentication scheme
Authentication schemes define one or more authentication servers to try to validate the identity of a
user. Think of an authentication scheme as a grouping of one or more authentication servers similar to
how user groups hold one or more users.
Caution:
When creating an authentication scheme name, the word sequence is reserved. Do not use the
word sequence in your scheme names.
To assign authentication to a rule, you must first define an authentication scheme and then assign this
scheme to the rule.
Note:
When OOBA is used with an authentication sequence, the same user name must be defined on all
authentication servers in the sequence.
Name
Type a name for this authentication server.
ACE Server Interface
Select the interface on the security gateway that is connected to the network that
connects to the RSA SecurID server.
Configuration data file
Select the correct RSA SecurID configuration file.
Caption
Type a brief description of the RSA SecurID server.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...