A
PPENDIX
A: A
UTHENTICATION
O
PERATIONS
T
IER
1: S
INGLE
S
IGN
-O
N
A
UTHENTICATION
184
M86 S
ECURITY
U
SER
G
UIDE
Tier 1: Single Sign-On Authentication
Net use based authentication process
The following diagram and steps describe the operations of
the net use based user authentication process:
Fig. A-1 Net use based authentication module diagram
1. The user logs on the network from a Windows worksta-
tion (also known as “client” or “machine”).
2. The authentication server on the network sends the
user’s workstation a login script containing a net use
command.
3. The execution of this net use command causes the
Windows workstation to create an “IPC share”
(command exchange) with the Web Filter as a shared
network device.
NOTE
: When the IPC share is created, no drives are mapped in
this share.