Cisco Cisco Web Security Appliance S370 Guia Do Utilizador

Página de 478
6-3
AsyncOS 9.0.1 for Cisco Web Security Appliances User Guide
 
Chapter 6      Classify End-Users and Client Software
  Classifying Users and Client Software
Classifying Users and Client Software 
Before You Begin
Create authentication realms. See 
 or 
.
Be aware that when you commit changes to Identification Profiles, end-users must re-authenticate.
If you are in Cloud Connector mode, be aware that an additional Identification Profile option is 
available: Machine ID. See 
.
(Optional) Create authentication sequences. See 
(Optional) Enable Secure Mobility if the Identification Profile will include mobile users. 
(Optional) Understand authentication surrogates. See 
.
Step 1
Choose Web Security Manager > Identification Profiles.
Step 2
Click Add Profile to add a profile.
Step 3
Use the Enable Identification Profile check box to enable this profile, or to quickly disable it without 
deleting it.
Step 4
Assign a unique profile Name.
Step 5
Description is optional. 
Step 6
From the Insert Above drop-down list, choose where this profile is to appear in the table.
Note
Position Identification Profiles that do not require authentication above the first Identification 
Profile that requires authentication. 
Step 7
In the User Identification Method section, choose an identification method and then supply related 
parameters; displayed options vary according to the method chosen.
User Agent
The user agent (client application) making the request must be in the Identification 
Profile’s list of user agents, if any are listed. Some user agents cannot handle 
authentication, therefore creating an profile that does not require authentication 
is necessary. User agents include Internet Explorer and Mozilla Firefox.
URL Category
The URL category of the request URL must be in the Identification Profile’s list of 
URL categories, if any are listed.
Authentication 
requirements
If the Identification Profile requires authentication, the client authentication 
credentials must match the Identification Profile’s authentication requirements. 
Option
Description