Administrator's Guide - Kerio Software Archive

Administrator's Guide - Kerio Software Archive Administrator's Guide - Kerio Software Archive

download.kerio.com
from download.kerio.com More from this publisher
30.01.2015 Views

User Authentication Redirection to the authentication page If the Always require users to be authenticated when accessing web pages option is enabled, user authentication will be required for access to any website (unless the user is already authenticated). The method of the authentication request depends on the method used by the particular browser to connect to the Internet: • Direct access — the browser will be automatically redirected to the authentication page of the Kerio Control’s web interface (see chapter 12.2) and, if the authentication is successful, to the solicited web page. • Kerio Control proxy server — the browser displays the authentication dialog and then, if the authentication is successful, it opens the solicited web page. If the Always require users to be authenticated when accessing web pages option is disabled, user authentication will be required only for Web pages which are not available (are denied by URL rules) to unauthenticated users (refer to chapter 13.2). Note: User authentication is used both for accessing a Web page (or/and other services) and for monitoring of activities of individual users (the Internet is not anonymous). Force non-transparent proxy server authentication Under usual circumstances, a user connected to the firewall from a particular computer is considered as authenticated by the IP address of the host until the moment when they log out manually or are logged out automatically for inactivity. However, if the client station allows multiple users connected to the computer at a moment (e.g. Microsoft Terminal Services, Citrix Presentation Server orFast user switching on Windows XP, Windows Server 2003, Windows Vista and Windows Server 2008), the firewall requires authentication only from the user who starts to work on the host as the first. The other users will be authenticated as this user. In case of HTTP and HTTPS, this technical obstruction can be passed by. In web browsers of all clients of the multi-user system, set connection to the Internet via the Kerio Control’s proxy server (for details, see chapter 9.4), and enable the Enable non-transparent proxy server option in Kerio Control. The proxy server will require authentication for each new session of the particular browser. 6 . Forcing user authentication on the proxy server for initiation of each session may bother users working on “single-user” hosts. Therefore, it is desirable to force such authentication only for hosts used by multiple users. For this purpose, you can use the Apply only for these IP addresses option. Automatic authentication (NTLM) If the Enable user authentication automatically... option is checked and Internet Explorer or Firefox/SeaMonkey is used, it is possible to authenticate the user automatically using the NTLM method. This means that the browser does not require username and password and simply uses the identity of the first user connected to Windows. However, the NTLM method is not 6 Session is every single period during which a browser is running. For example, in case of Internet Explorer, Firefox and Opera, a session is terminated whenever all windows and tabs of the browser are closed, while in case of SeaMonkey, a session is not closed unless the Quick Launch program is stopped (an icon is displayed in the toolbar’s notification area when the program is running). 162

11.1 Firewall User Authentication available for other operating systems. For details, refer to chapter 25.3. Automatically logout users when they are inactive Timeout is a time interval (in minutes) of allowed user inactivity. When this period expires, the user is automatically logged out from the firewall. The default timeout value is 120 minutes (2 hours). This situation often comes up when a user forgets to logout from the firewall. Therefore, it is not recommended to disable this option, otherwise login data of a user who forgot to logout might be misused by an unauthorized user. 163

11.1 Firewall User Authentication<br />

available for other operating systems.<br />

For details, refer to chapter 25.3.<br />

Automatically logout users when they are inactive<br />

Timeout is a time interval (in minutes) of allowed user inactivity. When this period<br />

expires, the user is automatically logged out from the firewall. The default timeout value<br />

is 120 minutes (2 hours).<br />

This situation often comes up when a user forgets to logout from the firewall. Therefore,<br />

it is not recommended to disable this option, otherwise login data of a user who forgot<br />

to logout might be misused by an unauthorized user.<br />

163

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!