A
A: A
PPENDIX
UTHENTICATION
Tier 1: Single Sign-On Authentication
Net use based authentication process
184
O
T
1: S
PERATIONS
IER
The following diagram and steps describe the operations of
the net use based user authentication process:
Fig. A-1 Net use based authentication module diagram
1. The user logs on the network from a Windows worksta-
tion (also known as "client" or "machine").
2. The authentication server on the network sends the
user's workstation a login script containing a net use
command.
3. The execution of this net use command causes the
Windows workstation to create an "IPC share"
(command exchange) with the Web Filter as a shared
network device.
NOTE: When the IPC share is created, no drives are mapped in
this share.
S
-O
A
INGLE
IGN
N
UTHENTICATION
M86 S
U
G
ECURITY
SER
UIDE