Cisco Cisco Web Security Appliance S670 ユーザーガイド

ページ / 606
 
28-3
Cisco IronPort AsyncOS 7.7 for Web User Guide
 
Chapter 28      Common Tasks
Bypassing Authentication for Specific User Agents
Bypassing Authentication for Specific User Agents
In this task, you will make sure the Web Proxy does not authenticate requests from particular user agents 
on the network. You might want to do this to for user agents that cannot prompt end users for their 
authentication credentials. In particular, this task will bypass authentication for all applications that 
access the Web on the iPhone, iPad, and iPod.
This task assumes one or more authentication realms are already defined on the Web Security appliance.
Step 1
Navigate to the Web Security Manager > Identities page.
Step 2
Click Add Identity.
Step 3
In the Name field, enter a name for this policy, such as 
UserAgentsToBypass
.
Step 4
In the Insert Above field, verify this Identity is above all other Identities that require authentication.
Step 5
Under Membership Definition, click Advanced to expand the advanced policy options.
Step 6
Click the link next to User Agents.
Step 7
On the Identities: Policy “UserAgentsToBypass”: Membership by User Agent page, in the Common 
User Agents section, click Others to expand the other user agents.
Step 8
Select the Microsoft Windows Update check box.
Step 9
In the Customer User Agents field, enter the following entries:
  •
iPhone
 
  •
iPad
 
  •
iPod
 
Step 10
Click Done
Step 11
Click Submit.
Step 12
Navigate to the Web Security Manager > Access Policies page.
Step 13
Click Add Policy.
Step 14
In the Policy Name field, enter a name for this policy, such as 
APBypassAuthUserAgents
.
Step 15
In the Identities and Users field, choose “Select One or More Identities.”
Step 16
In the Identity field, select the Identity created in 
Step 17
Submit and Commit your changes.
When an application on the iPhone, iPad, or iPod tries to access the Web, it succeeds and does not prompt 
users for their username and password.
Note
You can add the %u custom field to the access logs to see which user agents try to access the Web.
Where to Find More Information
You can read the following sections for more detailed information on the steps included in this task:
  •
  •