Cisco Cisco Web Security Appliance S670 User Guide
![Cisco](https://files.manualsbrain.com/attachments/7380d0050044647c30f5c24bbbf5d0c0b6d9bb84/common/fit/150/50/faa183d287233c52228cfea3dbc2a127fe780f60564fcb0955d9c3d1cd23/brand_logo.png)
20-11
Cisco IronPort AsyncOS 7.0 for Web User Guide
OL-23079-01
Chapter 20 Authentication
Understanding How Authentication Works
Step 8
If the client requests the original web page again, the Web Proxy transparently
intercepts the request, confirms the user by IP address or cookie, and returns the
requested page.
intercepts the request, confirms the user by IP address or cookie, and returns the
requested page.
Note
If the client tries to connect to another web page and the Web Proxy tracked the
user by IP address, the Web Proxy confirms the user by IP address and returns the
requested page.
user by IP address, the Web Proxy confirms the user by IP address and returns the
requested page.
lists advantages and disadvantages of using transparent Basic
authentication and IP-based credential caching.
Table 20-5
Pros and Cons of Transparent Basic Authentication—IP
Caching
Caching
Advantages
Disadvantages
•
Works with all major browsers
•
With user agents that do not
support authentication, users
only need to authenticate first in
a supported browser
support authentication, users
only need to authenticate first in
a supported browser
•
Relatively low overhead
•
Works for HTTPS requests if the
user has previously authenticated
with an HTTP request
user has previously authenticated
with an HTTP request
•
Authentication credentials are
associated with the IP address, not
the user (does not work in Citrix and
RDP environments, or if the user
changes IP address)
associated with the IP address, not
the user (does not work in Citrix and
RDP environments, or if the user
changes IP address)
•
No single sign-on
•
Password is sent as clear text
(Base64)
(Base64)