CONTENTS
vi 8E6 TECHNOLOGIES, R3000 ENTERPRISE FILTER AUTHENTICATION USER GUIDE
R3000 Authentication Tiers ............................................................. 23
Tier 1: Single Sign-On Authentication ............................................. 25
Net use based authentication process ..................................... 25
Re-authentication process .................................................. 26
Authentication methods ............................................................ 27
SMB protocol....................................................................... 27
SMB Signing................................................................. 27
LDAP protocol ..................................................................... 28
Name resolution methods ......................................................... 29
Authentication setup procedures . ............................................. 30
Server setup types .............................................................. 30
Tier 1: Net use based authentication ............................ 30
Tier 2 and Tier 3: Web-based authentication................ 30
Configuring the authentication server ....................................... 31
Login scripts ....................................................................... 32
Enter net use syntax in the login script......................... 32
View login script on the server console ........................ 33
Block page authentication login scripts......................... 34
LDAP server setup rules ........................................................... 35
Tier 2: Time-based, Web Authentication ......................................... 36
Tier 2 implementation in an environment .................................. 37
Tier 2 Script ........................................................................ 38
Tier 1 and Tier 2 Script ....................................................... 39
Tier 3: Session-based, Web Authentication .................................... 41
8e6 Authenticator ............................................................................ 42
Environment requirements ....................................................... 42
Minimum system requirements ........................................... 42
Recommended system requirements ................................ 43
Workstation requirements ......................................................... 43
Work flow in a Windows environment ....................................... 44
8e6 Authenticator configuration priority .............................. 45
8e6 Authenticator configuration syntax .............................. 46
Sample command line parameters ............................... 46
Table of parameters ............................................................ 47
Novell eDirectory Agent .................................................................. 50
Environment requirements ....................................................... 50
Novell eDirectory servers .................................................... 50
Client workstations ............................................................. 51
Novell clients ....................................................................... 51
Novell eDirectory setup ............................................................ 51
R3000 setup and event logs . .................................................... 52