Cisco Cisco Web Security Appliance S160 Guía Del Usuario

Descargar
Página de 638
 
20-14
Cisco IronPort AsyncOS 7.5 for Web User Guide
Chapter 20      Authentication
Appliance Behavior with Multiple Authentication Realms
Step 5
Choose the realm name for any additional row you add.
Note
You can delete a realm from the sequence by clicking the trash can icon for that row.
Step 6
When you have entered all realms in the sequence, and they are in the order you want, submit and commit 
your changes.
Editing Authentication Sequences
To edit an authentication sequence:
Step 1
On the Network > Authentication page, click the sequence name.
Step 2
Perform any of the following tasks as necessary:
  •
Change the name of the sequence.
  •
Add a new realm by clicking Add Row.
  •
Delete a realm by clicking the trash can icon.
  •
Change the order of the realms by clicking the arrow icon in the Order column for the realm.
Step 3
Submit and commit your changes.
Deleting Authentication Sequences
If you delete an authentication sequence, any Access Policy group that depends on the deleted sequence 
becomes disabled.
To delete an authentication sequence:
Step 1
On the Network > Authentication page, click the trash can icon for the sequence name.
Step 2
Confirm that you want to delete the sequence by clicking Delete.
Step 3
Commit your changes.
Appliance Behavior with Multiple Authentication Realms
You can configure the Web Security appliance to attempt authenticating clients against multiple 
authentication servers, and against authentication servers with different authentication protocols. When 
you configure the appliance to authenticate against multiple authentication servers, it only requests the 
credentials from the clients once. This is true even when you configure the appliance to authenticate 
against different protocols.
You might want to configure a web policy group to authenticate against different realms if your 
organization acquires another organization that has its own authentication server using the same or a 
different authentication protocol. That way, you can create one Access Policy group for all users and 
assign to the policy group an authentication sequence that contains a realm for each authentication 
server.