Cisco Cisco Web Security Appliance S390 Betriebsanweisung

Seite von 432
 
6-5
Cisco AsyncOS for Web User Guide
 
Chapter 6      Acquire End-User Credentials
  Authentication Realms
b.
Click Join Domain.
Step 7
(Optional) Configure transparent user identification.
Step 8
Configure Network Security:
Step 9
(Optional) Click Start Test. This will test the settings you have entered, ensuring they are correct before 
real users use them to authenticate. For details on the testing performed, see 
.
Step 10
Submit and commit your changes.
Tip
Customize the access log to use the %m custom field parameter.
Next Step
Create an Identity that uses the Kerberos authentication scheme. 
.
NetBIOS domain name
If the network uses NetBIOS, provide the domain name. 
Tip
If this option is not available use the setntlmsecuritymode CLI 
command to verify that the NTLM security mode is set to 
“domain”. 
Computer Account
Specify a location within the Active Directory domain where AsyncOS 
will create an Active Directory computer account, also known as a 
“machine trust account”, to uniquely identify the computer on the domain. 
If the Active Directory environment automatically deletes computer 
objects at particular intervals, specify a location for the computer account 
that is in a container, protected from automatic deletion. 
Setting
Description
Setting
Description
Enable Transparent 
User Identification using 
Active Directory agent
Enter both the server name for the machine where the primary Active 
Directory agent is installed and the shared secret used to access it.
(Optional) Enter the server name for the machine where a backup Active 
Directory agent is installed and its shared secret.
Setting
Description
Client Signing Required
Select this option if the Active Directory server is configured to require 
client signing. 
With this option selected, AsyncOS uses Transport Layer Security when 
communicating with the Active Directory server.