8e6 Technologies R3000 Network Card User Manual


 
CHAPTER 1: INTRODUCTION AUTHENTICATION OPERATIONS
36 8E6 TECHNOLOGIES, R3000 ENTERPRISE FILTER AUTHENTICATION USER GUIDE
Tier 2: Time-based, Web Authentication
The following diagram and steps describe the operations of
the time-based authentication process:
Fig. 1-6 Web-based authentication module diagram
1. The user makes a Web request by entering a URL in his/
her browser window.
2. The R3000 intercepts this request and sends the user
the Authentication Request Form, requesting the user to
log in with his/her login ID and password.
3. The R3000 verifies the user’s information with the
authentication server (Domain Controller, Active Direc-
tory, LDAP, etc.).
4. The authenticated user is allowed to access the
requested URL for the time period specified by the
administrator.