Configure Authentication Domains, Groups, And Users; Login Portals - NETGEAR UTM9S Reference Manual

Prosecure unified threat management (utm) appliance
Hide thumbs Also See for UTM9S:
Table of Contents

Advertisement

Table 90. External authentication protocols and methods (continued)
Authentication
protocol or method
LDAP

Configure Authentication Domains, Groups, and Users

This section contains the following subsections:

Login Portals

Active Directories and LDAP Configurations
Configure Domains
Configure Groups
Configure User Accounts
Set User Login Policies
Change Passwords and Other User Settings
DC Agent
Configure RADIUS VLANs
Configure Global User Settings
View and Log Out Active Users
Login Portals
The login screen and authentication on the UTM depend on the user type. There are two
basic user types on the UTM that are explained in the following sections:
Administrative Users and Users with Guest Privileges
Users with Special Access Privileges
Unauthenticated or Anonymous Users
Administrative Users and Users with Guest Privileges
Users with administrative and guest privileges on the UTM need to log in through the
NETGEAR Configuration Manager Login screen (see the following figure), where they are
authenticated through the UTM's local user database. These users need to provide their user
name and password. After they have been authenticated, they then can access the web
management interface to view or change the UTM's configuration.
ProSecure Unified Threat Management (UTM) Appliance
Description
A network-validated domain-based authentication method that functions with a
Lightweight Directory Access Protocol (LDAP) authentication server. LDAP is a standard
for querying and updating a directory. Because LDAP supports a multilevel hierarchy (for
example, groups or organizational units), this information can be queried to provide
specific group policies or bookmarks based on LDAP attributes.
The UTM support single sign-on (SSO) through the use of the DC agent and additional
LDAP configuration options.
Managing Users, Authentication, and VPN Certificates
345

Advertisement

Table of Contents
loading

Table of Contents