Cisco Cisco Web Security Appliance S170 Guía Del Usuario
5-17
AsyncOS 8.1 for Cisco Web Security User Guide
Chapter 5 Acquire End-User Credentials
Authentication Sequences
Step 6
Submit and commit your changes.
Authentication Sequences
•
•
•
•
About Authentication Sequences
Use authentication sequences to allow single Identities to authenticate users via different authentication
servers or protocols. Authentication sequences are also useful for providing backup options in case
primary authentication options become unavailable.
servers or protocols. Authentication sequences are also useful for providing backup options in case
primary authentication options become unavailable.
Authentication sequences are collections of two or more authentication realms. The realms used can
have different authentication servers and different authentication protocols. For more information on
authentication realms, see
have different authentication servers and different authentication protocols. For more information on
authentication realms, see
.
After you create a second authentication realm, the appliance automatically displays a Realm Sequences
section under Network > Authentication and includes a default authentication sequence named All
Realms. The All Realms sequence automatically includes each realm you define. You can change the
order of the realms within the All Realms sequence, but you cannot delete the All Realms sequence or
remove any realms from it.
section under Network > Authentication and includes a default authentication sequence named All
Realms. The All Realms sequence automatically includes each realm you define. You can change the
order of the realms within the All Realms sequence, but you cannot delete the All Realms sequence or
remove any realms from it.
User Session
Restrictions
Restrictions
This setting specifies whether or not authenticated users are allowed to
access the Internet from multiple IP addresses simultaneously.
access the Internet from multiple IP addresses simultaneously.
You might want to restrict access to one machine to prevent users from
sharing their authentication credentials with non-authorized users. When a
user is prevented from logging at a different machine, an end-user
notification page appears. You can choose whether or not users can click a
button to login as a different username using the Re-authentication setting
on this page.
sharing their authentication credentials with non-authorized users. When a
user is prevented from logging at a different machine, an end-user
notification page appears. You can choose whether or not users can click a
button to login as a different username using the Re-authentication setting
on this page.
When you enable this setting, enter the restriction timeout value, which
determines how long users must wait before being able to log into a machine
with a different IP address. The restriction timeout value must be greater
than the surrogate timeout value.
determines how long users must wait before being able to log into a machine
with a different IP address. The restriction timeout value must be greater
than the surrogate timeout value.
You can remove a specific user or all users from the authentication cache
using the
using the
authcache
CLI command.
Advanced
When using Credential Encryption or Access Control, you can choose
whether the appliance uses the digital certificate and key shipped with the
appliance (the Cisco Web Security Appliance Demo Certificate) or a digital
certificate and key you upload here.
whether the appliance uses the digital certificate and key shipped with the
appliance (the Cisco Web Security Appliance Demo Certificate) or a digital
certificate and key you upload here.
To upload a digital certificate and key, click Browse and navigate to the
necessary file on your local machine. Then click Upload Files after you
select the files you want.
necessary file on your local machine. Then click Upload Files after you
select the files you want.
Setting
Description