M86 Security M86 Web Filter User Manual page 8

Hide thumbs Also See for M86 Web Filter:
Table of Contents

Advertisement

C
ONTENTS
Tier 1: Single Sign-On Authentication .................................. 184
Tier 2: Time-based, Web Authentication ............................... 190
Tier 3: Session-based, Web Authentication ......................... 195
M86 Authenticator ................................................................... 196
Novell eDirectory Agent ......................................................... 208
viii
Tier 2, Tier 3: Web-based authentication ...................................... 183
Net use based authentication process .......................................... 184
Re-authentication process ...................................................... 185
Tier 1 authentication method ......................................................... 186
Name resolution methods ............................................................. 186
Configuring the authentication server ........................................... 187
Login scripts ........................................................................... 187
Enter net use syntax in the login script ............................. 187
View login script on the server console .................................. 188
Block page authentication login scripts ............................. 188
LDAP server setup rules ............................................................... 189
Tier 2 implementation in an environment ...................................... 191
Tier 2 Script . ........................................................................... 192
Tier 1 and Tier 2 Script . .......................................................... 193
Environment requirements ............................................................ 197
Windows minimum system requirements ............................... 197
Recommended system requirements ............................... 197
Macintosh minimum system requirements ............................. 198
Workstation requirements ............................................................. 198
Work flow in environments ............................................................ 199
Windows environment ............................................................ 199
Macintosh environment . ......................................................... 200
M86 Authenticator configuration priority . ................................ 201
Windows............................................................................ 201
Macintosh ......................................................................... 202
M86 Authenticator configuration syntax . ................................ 203
Sample command line parameters ................................... 203
Sample configuration file ............................................ 203
Table of parameters . .............................................................. 205
Environment requirements ............................................................ 208
M86 S
U
G
ECURITY
SER
UIDE

Advertisement

Table of Contents
loading

Table of Contents