Appendix a: authentication operations 199, A: a, Ppendix – 8e6 Technologies Enterprise Filter Authentication R3000 User Manual

Page 10: Uthentication, Perations

Advertising
background image

C

ONTENTS

x

8

E

6 T

ECHNOLOGIES

, R3000 I

NTERNET

F

ILTER

A

UTHENTICATION

U

SER

G

UIDE

Hours ........................................................................................ 196

Contact Information ................................................................ 196

Domestic (United States) .............................................................. 196
International .................................................................................. 196
E-Mail ............................................................................................ 196
Office Locations and Phone Numbers .......................................... 197

8e6 Corporate Headquarters (USA) ....................................... 197
8e6 Taiwan ............................................................................. 197

Support Procedures ................................................................ 198

A

PPENDIX

A: A

UTHENTICATION

O

PERATIONS

................ 199

Authentication Tier Selections .............................................. 199

Tier 1: Net use based authentication ............................................ 199
Tier 2, Tier 3: Web-based authentication ...................................... 200

Tier 1: Single Sign-On Authentication .................................. 201

Net use based authentication process .......................................... 201

Re-authentication process . ..................................................... 203

Tier 1 authentication methods ....................................................... 203

SMB protocol .......................................................................... 203

SMB Signing ..................................................................... 203

LDAP protocol ........................................................................ 204

Name resolution methods ............................................................. 205
Configuring the authentication server ........................................... 206

Login scripts ........................................................................... 206

Enter net use syntax in the login script ............................. 206

View login script on the server console .................................. 207

Block page authentication login scripts ............................. 207

LDAP server setup rules ............................................................... 208

Tier 2: Time-based, Web Authentication ............................... 209

Tier 2 implementation in an environment ...................................... 210

Tier 2 Script . ........................................................................... 211
Tier 1 and Tier 2 Script . .......................................................... 212

Tier 3: Session-based, Web Authentication ......................... 214

8e6 Authenticator .................................................................... 215

Advertising