CHAPTER 1: INTRODUCTION AUTHENTICATION OPERATIONS

Tier 1: Single Sign-On Authentication

Net use based authentication process

The following diagram and steps describe the operations of the net use based user authentication process:

Fig. 1-5 Net use based authentication module diagram

1.The user logs on the network from a Windows worksta- tion (also known as “client” or “machine”).

2.The authentication server on the network sends the user’s workstation a login script containing a net use command.

3.The execution of this net use command causes the Windows workstation to create an “IPC share” (command exchange) with the R3000 filter box as a shared network device.

NOTE: When the IPC share is created, no drives are mapped in this share.

8E6 TECHNOLOGIES, R3000 ENTERPRISE FILTER AUTHENTICATION USER GUIDE

25

Page 37
Image 37
8e6 Technologies R3000 manual Tier 1 Single Sign-On Authentication, Net use based authentication process