439
Enabling remote access with clientless VPN
Enabling single sign-on for remote users
4
In the Portal Page Selection dialog box, select the portal page you want to add, and then click
OK
.
5
Click
OK
.
6
Optionally, do one of the following:
■
To save your configuration and activate later, on the toolbar, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
Related information
For further information related to this topic, see the following:
■
“Clientless VPN Role Properties—Portal Pages tab”
■
“Adding news items to a portal page”
Enabling single sign-on for remote users
The security gateway single sign-on feature lets remote users access password-protected resources
from the user interface without re-entering their user names and passwords. The first time a user
accesses a resource with a single sign-on rule in place, the user name and password are stored. On
subsequent accesses to the resource, the remote clientless VPN user does not need to supply the logon
credentials.
Note:
The administrator must create a single sign-on access rule for each resource.
Collecting resource logon information
You can configure the security gateway to prompt users for their user names and passwords the first
time they access a specific resource. The information is stored and used to augment the resource URL
on subsequent visits.
When a single sign-on rule is configured for a resource, the following events occur:
■
The first time the remote user accesses the resource, the security gateway prompts the user for
their resource logon information (for example, user name and password).
■
The user types their information in the portal page and the security gateway stores it.
■
All subsequent times the remote user accesses the resource, the security gateway automatically
alters the URL with the user’s previously entered information and the user bypasses the resource
logon procedure.
Creating a single sign-on rule
You can enable user sign-on information capturing so that remote users do not have to re-enter user
names and passwords when accessing multiple resources.
Prerequisites
Complete the following tasks before beginning this procedure:
■
“Creating and assigning roles”
■
■
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...