Understanding the User Authentication Management System
175
The user names in the user authentication management system do not generally need to
match user names on the firewall itself. By default, you do not create any user accounts
on the firewall. The exception to this rule is the login-sh authentication wrapper program.
The login-sh program authenticates users before logging them into the firewall. Then, the
information in the user authentication management system must match the standard
IRIX user information (in /etc/passwd) for these users.
The user names in the user authentication management system do not need to match any
user names on your internal network. For example, John Whorfin might use “john” as his
user name on internal networks. He could use “whorfin” for strong authentication at the
firewall. You may wish to use the same names for the convenience of your users.
Groups
The Gauntlet user authentication management system also makes use of groups. Groups
allow you to permit or deny services based on groups of user names, rather than
individual user names. For example, you can configure the X11 proxy to permit service
to everyone in group sales.
Just as is the case with user names, the groups that you create in the Gauntlet user
authentication management system are not the same as the groups you create on the
firewall or on the internal network. You can of course use the same names, for easier
administration.
The Pieces
The user authentication management system consists of several programs. The use of
each of these components, and their options, is described in the appropriate sections of
this chapter.
Authentication Server
This program (authsrv) is a network daemon that actually verifies information against the
database. It also allows firewall administrators to modify user and group information,
and disables user accounts automatically after a configurable number of failed login
attempts
Содержание Gauntlet
Страница 1: ...Gauntlet for IRIX Administrator s Guide Document Number 007 2826 004 ...
Страница 16: ......
Страница 26: ......
Страница 27: ...PART ONE Understanding the Gauntlet Internet Firewall I ...
Страница 28: ......
Страница 43: ...PART TWO Configuring and Using Proxies II ...
Страница 44: ......
Страница 50: ......
Страница 56: ......
Страница 64: ......
Страница 72: ......
Страница 94: ......
Страница 109: ...PART THREE Administering General Gauntlet Firewall Services III ...
Страница 110: ......
Страница 140: ......
Страница 146: ...120 Chapter 17 The Graphical Management Interface Figure 17 3 Gauntlet Introductory Management Form 1 of 3 ...
Страница 147: ...Introductory Management Form 121 Figure 17 4 Gauntlet Introductory Management Form 2 of 3 ...
Страница 148: ...122 Chapter 17 The Graphical Management Interface Figure 17 5 Gauntlet Introductory Management Form 3 of 3 ...
Страница 150: ...124 Chapter 17 The Graphical Management Interface Figure 17 6 Networks and Interfaces Configuration Form 1 of 2 ...
Страница 151: ...Networks and Interfaces Configuration Form 125 Figure 17 7 Networks and Interfaces Configuration Form 2 of 2 ...
Страница 155: ...Routing Configuration Form 129 Figure 17 8 Routing Configuration Form ...
Страница 162: ...136 Chapter 17 The Graphical Management Interface Figure 17 10 Proxy Servers Configuration Form 1 of 3 ...
Страница 163: ...Proxy Servers Configuration Form 137 Figure 17 11 Proxy Servers Configuration Form 2 of 3 ...
Страница 164: ...138 Chapter 17 The Graphical Management Interface Figure 17 12 Proxy Servers Configuration Form 3 of 3 ...
Страница 170: ...144 Chapter 17 The Graphical Management Interface Figure 17 13 DNS Configuration Form 1 of 2 ...
Страница 171: ...DNS Configuration Form 145 Figure 17 14 DNS Configuration Form 2 of 2 ...
Страница 177: ...Sendmail on Gauntlet Servers 151 Figure 17 15 Sendmail Configuration Form ...
Страница 187: ...Logfiles and Reports Configuration Form 161 Figure 17 20 Reports and Logfiles Form 1 of 2 ...
Страница 191: ...Authorizing Users Form 165 Figure 17 22 Authorizing Users Form ...
Страница 192: ...166 Chapter 17 The Graphical Management Interface Figure 17 23 Add User Form ...
Страница 214: ......
Страница 232: ......
Страница 233: ...Appendixes IV ...
Страница 234: ......
Страница 294: ......
Страница 305: ......