Cisco Cisco Web Security Appliance S170 사용자 가이드

다운로드
페이지 606
 
8-6
Cisco IronPort AsyncOS 7.7 for Web User Guide
Chapter 8      Identities
Evaluating Identity Group Membership
Understanding How Authentication Affects HTTPS and FTP over HTTP Requests
How the Web Proxy matches HTTPS and FTP over HTTP requests with Identities depends on the type 
of request (either explicitly forwarded or transparently redirected to the Web Proxy) and the 
authentication surrogate type:
  •
No authentication surrogates. The Web Proxy matches HTTPS and FTP over HTTP requests with 
Identity groups the same way it matches HTTP requests. For a diagram of how this occurs, see 
.
  •
IP-based authentication surrogates and explicit requests. The Web Proxy matches HTTPS and 
FTP over HTTP requests with Identity groups the same way it matches HTTP requests. For a 
diagram of how this occurs, see 
  •
IP-based authentication surrogates and transparent requests. The Web Proxy matches FTP over 
HTTP requests with Identity groups the same way it matches HTTP requests. But for HTTPS 
requests, the behavior is different, depending on whether or not the HTTPS request comes from a 
client that has authentication information available from an earlier HTTP request:
  –
Information available from a previous HTTP request. The Web Proxy matches HTTPS 
requests with Identity groups the same way it matches HTTP requests. HTTPS requests are 
treated with the Identity associated with the IP address. 
  –
No information available from a previous HTTP request. When the Web Proxy has no 
credential information for the client, then it either fails the HTTPS request or decrypts the 
HTTPS request in order to authenticate the user, depending on how you configure the HTTPS 
Proxy. Use the HTTPS Transparent Request setting on the Security Services > HTTPS Proxy 
page to define this behavior. 
For a diagram of how this occurs, see 
  •
Cookie-based authentication surrogates and transparent requests. When the appliance uses 
cookie-based authentication, the Web Proxy does not get cookie information from clients for HTTPS 
and FTP over HTTP requests. Therefore, it cannot get the user name from the cookie. In this 
situation, HTTPS and FTP over HTTP requests still match the Identity group according to the other 
membership criteria, but the Web Proxy does not prompt clients for authentication even if the 
Identity group requires authentication
. Instead, the Web Proxy sets the user name to NULL and 
considers the user as unauthenticated. Then, when the unauthenticated request is evaluated against 
the non-Identity policy groups, it matches only non-Identity groups that specify “All Identities” and 
apply to “All Users.” Typically, this is the global policy, such as the global Access Policy. For a 
diagram of how this occurs, see 
  •
Cookie-based authentication surrogates and explicit requests. The behavior is different, 
depending on whether or not credential encryption is enabled:
  –
Credential encryption enabled. The behavior is the same as cookie-based authentication with 
transparent requests, as described previously. See also 
  –
Credential encryption disabled. The Web Proxy uses no surrogates. HTTPS and FTP over 
HTTP requests are authenticated and matched to Identity groups like HTTP requests. For a 
diagram of how this occurs, see