Cisco Cisco Web Security Appliance S380 Guía Del Usuario

Descargar
Página de 286
6-7
AsyncOS 9.2 for Cisco Web Security Appliances User Guide
 
Chapter 6      Classify End-Users and Client Software
  Identification Profiles and Authentication
Identification Profiles and Authentication 
The following diagram shows how the Web Proxy evaluates a client request against an Identification 
Profile when the Identification Profiles is configured to use:
No authentication surrogates
IP addresses as authentication surrogates
Cookies as authentication surrogates with transparent requests
Cookies as authentication surrogates with explicit requests and credential encryption is enabled
Figure 6-1
Identification Profiles and Authentication Processing – No Surrogates and 
IP-based Surrogates