30.01.2015 Views

Administrator's Guide - Kerio Software Archive

Administrator's Guide - Kerio Software Archive

Administrator's Guide - Kerio Software Archive

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 11<br />

User Authentication<br />

<strong>Kerio</strong> Control allows administrators to monitor connections (packet, connection, web pages or<br />

FTP objects and command filtering) related to each user. The username in each filtering rule<br />

represents the IP address of the host(s) from which the user is connected (i.e. all hosts the<br />

user is currently connected from). This implies that a user group represents all IP addresses<br />

its members are currently connected from.<br />

Besides access restrictions, user authentication can be used also for monitoring of their<br />

activities in the <strong>Kerio</strong> StaR interface (see chapter 21), in logs (see chapter 22), in the list<br />

of opened connections (see chapter 19.2) and in the overview of hosts and users (see<br />

chapter 19.1). If there is no user connected from a certain host, only the IP address of the<br />

host will be displayed in the logs and statistics. In statistics, this host’s traffic will be included<br />

in the group of not logged in users.<br />

11.1 Firewall User Authentication<br />

Any user with their own account in <strong>Kerio</strong> Control can authenticate at the firewall (regardless<br />

their access rights). Users can connect:<br />

• Manually — by opening the <strong>Kerio</strong> Control web interface in their browser<br />

https://server:4081/ or http://server:4080/<br />

(the name of the server is only an example — see chapter 12).<br />

It is also possible to authenticate for viewing of the web statistics (see chapter 21) at<br />

https://server:4081/star or http://server:4080/star<br />

Note: Login to the Administration interface at<br />

https://server:4081/admin or http://server:4080/admin<br />

is not equal to user authentication at the firewall (i.e. the user does not get<br />

authenticated at the firewall by the login)!<br />

• Automatically — IP addresses of hosts from which they will be authenticated<br />

automatically can be associated with individual users. This actually means that<br />

whenever traffic coming from the particular host is detected, <strong>Kerio</strong> Control assumes<br />

that it is currently used by the particular user , and the user is considered being<br />

authenticated from the IP address. However, users may authenticate from other hosts<br />

(using the methods described above).<br />

IP addresses for automatic authentication can be set during definition of user account<br />

(see chapter 16.1).<br />

160

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!