Choosing An Authentication Method - Matrox Iris E Series Installation And Technical Reference

With design assistant
Table of Contents

Advertisement

• Open Microsoft Internet Explorer and go to the following address:
ftp://IrisName
You can enable or disable the Matrox Iris E-Series FTP server through the Telnet /
FTP server settings page of the Matrox Iris portal website. If enabled, you can
also enable authentication from the same page.
❖ Note that if authentication (either basic or NTLM) is enabled, you will be
prompted for a user name and a password. Refer to the Telnet / FTP server settings
page of the Matrox Iris portal website for more information.
C h o o s i n g a n a u t h e n t i c a t i o n m e t h o d
Basic authentication is provided for Matrox Iris E-Series services (web server, file
server, telnet server, andFTP server). Enabling this authentication will help secure
your Matrox Iris E-Series. For more details regarding authentication and each
service, refer to the Matrox Iris portal website.
If authentication is enabled, whenever a user tries to access a Matrox Iris E-Series
service, they are prompted for a valid user name and password. If either piece of
information is incorrect, the user cannot access the service. Security can use either:
• Basic authentication. Basic authentication uses a list of user names (provided
through the Matrox Iris portal website) and a single system password that you set
for your Matrox Iris E-Series (refer to the System password page of the Matrox
Iris portal website).
• NTLM. NTLM (NT LAN Management) uses the NT challenge/response
(NTCR) authentication. NTLM authenticates a user without sending the user's
password over the network. Instead, the system requesting authentication must
perform a calculation that proves it has access to the secured NTLM credentials
(namely the user name, password and domain name). The authentication domain
server of your LAN provides the list of user names that can access your Matrox
Iris E-Series which are used to validate the calculation. NTLM consists of three
steps: negotiation, challenge, and authentication. All three steps are handled by
Microsoft Internet Explorer and should be invisible to the user.
C h o o s i n g a n a u t h e n t i c a t i o n m e t h o d
6 7

Advertisement

Table of Contents
loading

Table of Contents