
Chapter 5: Implementing Identification Policy
39
C
HAPTER
5:
I
MPLEMENTING
I
DENTIFICATION
P
OLICY
NOTE:
The
process
of
implementing
security
for
users
at
your
site
involves
performing
the
following
tasks:
Identification policies define whether and how Scanning Servers will identify end‐users who are
browsing via the Secure Web Gateway system. SWG has a number of pre‐supplied Identification
policies that use different mechanisms to perform Identification. If you choose an Authentication‐
type Identification policy, you must also define an Active Directory.
Regardless of the type of Identification policy, as soon as the Secure Web Gateway identifies a user
by confirming a matching identifier, the assigned Security policy is enforced.
This chapter includes the following procedures:
•
Defining and Customizing Identification Policy
•
Defining an Active Directory
Defining and Customizing Identification Policy
M86 Security provides several predefined Identification Policies.
Â
To set and customize Identification Policy
1. Decide which policy should be used for the Identification Policy. Possible Identification Policies
are:
•
Authentication
— authenticates end‐users using an Authentication Server.
•
Default
Cloud
Scanners
Read
Headers
Policy
— identifies users based on pre‐authenti‐
cated HTTP headers for regular and Cloud scanners.
•
Get
User
Credential
— identifies users via USERID information using the NTLM protocol
without verifying user password against the authentication server.
• Defining Security Policy. For instructions, see
Chapter 3: Defining and Customizing
Security Policies
.
• Defining User Groups and Users, and assigning them security policies. For instructions,
see
Chapter 4: Defining and Managing Users
.
• Defining Identification policy, as described in this chapter.
NOTE:
Unlike
with
other
pre
supplied
policies,
you
can
directly
edit
a
pre
supplied
Identification
Policy.