Cisco Cisco Web Security Appliance S690 Guida Utente

Pagina di 824
20-11
Cisco IronPort AsyncOS 7.1 for Web User Guide
OL-23207-01
Chapter 20      Authentication
Understanding How Authentication Works
Step 8
If the client requests the original web page again, the Web Proxy transparently 
intercepts the request, confirms the user by IP address or cookie, and returns the 
requested page.
Note
If the client tries to connect to another web page and the Web Proxy tracked the 
user by IP address, the Web Proxy confirms the user by IP address and returns the 
requested page.
 lists advantages and disadvantages of using transparent Basic 
authentication and IP-based credential caching. 
Advantages
Disadvantages
Works with all major browsers
With user agents that do not 
support authentication, users 
only need to authenticate first in 
a supported browser
Relatively low overhead
Works for HTTPS requests if the 
user has previously authenticated 
with an HTTP request
Authentication credentials are 
associated with the IP address, not 
the user (does not work in Citrix and 
RDP environments, or if the user 
changes IP address)
No single sign-on
Password is sent as clear text 
(Base64)