CHAPTER 1: INTRODUCTION AUTHENTICATION OPERATIONS

Tier 2: Time-based, Web Authentication

The following diagram and steps describe the operations of the time-based authentication process:

Fig. 1-6 Web-based authentication module diagram

1.The user makes a Web request by entering a URL in his/ her browser window.

2.The R3000 intercepts this request and sends the user the Authentication Request Form, requesting the user to log in with his/her login ID and password.

3.The R3000 verifies the user’s information with the authentication server (Domain Controller, Active Direc- tory, LDAP, etc.).

4.The authenticated user is allowed to access the requested URL for the time period specified by the administrator.

36

8E6 TECHNOLOGIES, R3000 ENTERPRISE FILTER AUTHENTICATION USER GUIDE

Page 48
Image 48
8e6 Technologies R3000 manual Tier 2 Time-based, Web Authentication, Web-based authentication module diagram