Cisco Cisco Web Security Appliance S380 用户指南
![Cisco](https://files.manualsbrain.com/attachments/7380d0050044647c30f5c24bbbf5d0c0b6d9bb84/common/fit/150/50/faa183d287233c52228cfea3dbc2a127fe780f60564fcb0955d9c3d1cd23/brand_logo.png)
6-7
AsyncOS 9.2 for Cisco Web Security Appliances User Guide
Chapter 6 Classify End-Users and Client Software
Identification Profiles and Authentication
Identification Profiles and Authentication
The following diagram shows how the Web Proxy evaluates a client request against an Identification
Profile when the Identification Profiles is configured to use:
Profile when the Identification Profiles is configured to use:
•
No authentication surrogates
•
IP addresses as authentication surrogates
•
Cookies as authentication surrogates with transparent requests
•
Cookies as authentication surrogates with explicit requests and credential encryption is enabled
Figure 6-1
Identification Profiles and Authentication Processing – No Surrogates and
IP-based Surrogates
IP-based Surrogates