
428
Enabling remote access with clientless VPN
Using roles to assign rules to users
7
Optionally, do one of the following:
■
To save your configuration and activate later, on the toolbar, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
Related information
For further information related to this topic, see the following:
■
“Importing user role text files”
■
“Clientless VPN Role Properties—General tab”
Importing user role text files
If you have an existing database of users defined on an authentication server, you can import that
database for use by the security gateway. For example, user roles from an Active Directory or LDAP
server can be imported.
The security gateway can import lists of users and groups from text files (with a .txt file name
extension, containing each name on a separate line), or comma-separated value format files (with a .csv
file name extension, and names separated by commas).
Prerequisites
Complete the following task before beginning this procedure:
■
“Configuring users for internal authentication”
To import user roles
1
In the SGMI, in the left pane, under Policy, click
Clientless VPN
.
2
In the right pane, on the Roles tab, click
Import Roles
.
3
In the Import Roles dialog box, in the Authentication server drop-down menu, select the
authentication server on which the roles are defined.
4
Under Role type, click
User
.
5
To import roles from a file, check
Import from file
and click the ellipsis (...) button to browse to the
file.
The users from the server appear in the role list with the following naming convention:
name:server_name:user.
where:
■
name is the name of the user as defined on the security gateway
■
server_name is the name of the server configured on the security gateway
6
Select the file to import, and then click
OK
.
7
Optionally, do one of the following:
■
To save your configuration and activate later, on the toolbar, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
Related information
For further information related to this topic, see the following:
■
■
Содержание Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Страница 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Страница 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Страница 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Страница 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Страница 319: ...318 Controlling traffic at the security gateway Blocking inappropriate content with content filtering...
Страница 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Страница 409: ...408 Providing remote access using VPN tunnels Multicast traffic through gateway to gateway IPsec tunnels...
Страница 509: ...508 Generating reports Upgrade reports...
Страница 553: ...552 Advanced system settings Configuring advanced options...
Страница 557: ...556 SSL server certificate management Installing a signed certificate...
Страница 861: ...860 Index...