Cisco Cisco Web Security Appliance S160 Guía Del Usuario

Descargar
Página de 286
6-8
AsyncOS 9.2 for Cisco Web Security Appliances User Guide
 
Chapter 6      Classify End-Users and Client Software
  Troubleshooting Identification Profiles
The following diagram shows how the Web Proxy evaluates a client request against an Identification 
Profile when the Identification Profile is configured to use cookies as the authentication surrogates, 
credential encryption is enabled, and the request is explicitly forwarded.
Figure 6-2
Identification Profiles and Authentication Processing – Cookie-based Surrogates
Troubleshooting Identification Profiles