8e6 Technologies R3000 Network Card User Manual


 
CONTENTS
vi 8E6 TECHNOLOGIES, R3000 ENTERPRISE FILTER AUTHENTICATION USER GUIDE
R3000 Authentication Tiers .............................................................23
Tier 1: Single Sign-On Authentication .............................................25
Net use based authentication process .....................................25
Re-authentication process .................................................. 26
Authentication methods ............................................................27
SMB protocol....................................................................... 27
SMB Signing.................................................................27
LDAP protocol.....................................................................28
Name resolution methods .........................................................29
Authentication setup procedures . .............................................30
Server setup types ..............................................................30
Tier 1: Net use based authentication............................ 30
Tier 2 and Tier 3: Web-based authentication................30
Configuring the authentication server .......................................31
Login scripts .......................................................................32
Enter net use syntax in the login script.........................32
View login script on the server console ........................33
Block page authentication login scripts.........................34
LDAP server setup rules ...........................................................35
Tier 2: Time-based, Web Authentication ......................................... 36
Tier 2 implementation in an environment ..................................37
Tier 2 Script ........................................................................ 38
Tier 1 and Tier 2 Script .......................................................39
Tier 3: Session-based, Web Authentication ....................................41
8e6 Authenticator ............................................................................ 42
Environment requirements .......................................................42
Minimum system requirements ...........................................42
Recommended system requirements ................................ 43
Workstation requirements ......................................................... 43
Work flow in a Windows environment ....................................... 44
8e6 Authenticator configuration priority ..............................45
8e6 Authenticator configuration syntax .............................. 46
Sample command line parameters...............................46
Table of parameters............................................................ 47
Novell eDirectory Agent ..................................................................50
Environment requirements .......................................................50
Novell eDirectory servers....................................................50
Client workstations ............................................................. 51
Novell clients .......................................................................51
Novell eDirectory setup ............................................................51
R3000 setup and event logs .....................................................52