McAfee MAP-3300-SWG Product Guide - Page 241

Policy Groups, Role-Based User Accounts, Table 234, Option definitions

Page 241 highlights

Overview of System features Users, Groups and Services When a user attempts an HTTP connection, the appliance tries to authenticate the user with the first authentication service in the group. If the user is not authenticated by this service, the appliance tries the next service. Table 234 Option definitions Option Add Service Add Group Definition When clicked, opens a wizard to help you configure a service. When clicked, opens another window where you can provide a name for a group of services. Give a suitable name to the group so that you can refer to the group easily when specifying the authentication policy for HTTP connection to each of your networks. Authentication cookie suffix Specifies a string to be appended to the authentication cookie name generated by the appliance. The cookie prefix default is SCMAuth_. Log the user's identity Use reverse DNS lookups with Kerberos authentication When selected, displays user names in the log file. If not selected, the user name is blank. In some countries, logging individual user names is not permitted. When selected, the appliance will perform reverse DNS lookup of the fully qualified hostname (FQDN) of the appliance that is specified in the Kerberos authentication service settings. If selected, ensure your DNS is set up correctly for the hostname for both forward and reverse lookups, otherwise significant delays can occur during authentication of users. Configure HTTP user authentication When clicked, opens another page. To open the page at other times, select Web | Web Configuration | HTTP | Connection Settings from the navigation bar. Policy Groups Use this page to build lists of users and networks to which you can apply policies. System | Users, Groups and Services | Policy Groups This is useful where you cannot define a part of the network or groups of users who are listed by a directory service. For example, you can create a policy group called Managers, which lists the email addresses of several managers. Role-Based User Accounts Use this page to create user accounts with different roles. For example, some users can make changes to important settings, while others can only generate reports. System | Users, Groups and Services | Role-Based User Accounts Use this page also to make a list of Kerberos realms or Active Directory domains, and set a timeout for each browser session. The page has these sections: McAfee Email and Web Security Appliances 5.6.0 Product Guide 241

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336

When a user attempts an HTTP connection, the appliance tries to authenticate the user with the first
authentication service in the group. If the user is not authenticated by this service, the appliance tries
the next service.
Table 234
Option definitions
Option
Definition
Add Service
When clicked, opens a wizard to help you configure a service.
Add Group
When clicked, opens another window where you can provide a name for a
group of services.
Give a suitable name to the group so that you can refer to the group easily
when specifying the authentication policy for HTTP connection to each of your
networks.
Authentication cookie
suffix
Specifies a string to be appended to the authentication cookie name generated
by the appliance. The cookie prefix default is SCMAuth_.
Log the user's identity
When selected, displays user names in the log file. If not selected, the user
name is blank. In some countries, logging individual user names is not
permitted.
Use reverse DNS lookups
with Kerberos
authentication
When selected, the appliance will perform reverse DNS lookup of the fully
qualified hostname (FQDN) of the appliance that is specified in the Kerberos
authentication service settings.
If selected, ensure your DNS is set up correctly for the hostname for both
forward and reverse lookups, otherwise significant delays can occur during
authentication of users.
Configure HTTP user
authentication
When clicked, opens another page. To open the page at other times, select
Web
|
Web Configuration
|
HTTP
|
Connection Settings
from the navigation bar.
Policy Groups
Use this page to build lists of users and networks to which you can apply policies.
System
|
Users, Groups and Services
|
Policy Groups
This is useful where you cannot define a part of the network or groups of users who are listed by a
directory service. For example, you can create a policy group called Managers, which lists the email
addresses of several managers.
Role-Based User Accounts
Use this page to create user accounts with different roles. For example, some users can make changes
to important settings, while others can only generate reports.
System
|
Users, Groups and Services
|
Role-Based User Accounts
Use this page also to make a list of Kerberos realms or Active Directory domains, and set a timeout for
each browser session.
The page has these sections:
Overview of System features
Users, Groups and Services
McAfee Email and Web Security Appliances 5.6.0 Product Guide
241