13
Svn.spamsvn110 QuickStart Guide to Authentication WebTitan Version 5

QuickStart Guide to Authentication

  • Upload
    dangque

  • View
    229

  • Download
    0

Embed Size (px)

Citation preview

Page 1: QuickStart Guide to Authentication

Svn.spamsvn110

QuickStart Guide to Authentication

WebTitan Version 5

Page 2: QuickStart Guide to Authentication

2

Copyright © 2014 Copperfasten Technologies. All rights reserved. The product described in this document is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Copperfasten Technologies gives no condition, warranty, expressed or implied about the fitness or quality of this manual or the accompanying product. Copperfasten reserves the right to make changes to this manual or the accompanying product, without notice to any person or company. Copperfasten shall not be liable for any indirect, incidental, special, or consequential damages, loss of profits, loss of goodwill, loss of reputation or economic loss resulting from the use of this manual or the accompanying product whether caused through Copperfasten negligence or otherwise and based on contract, tort, strict liability or otherwise, even if Copperfasten or any of its suppliers has been advised of the possibility of damages.

WebTitan is a trademark of Copperfasten Technologies Limited.

Support

WebTitan technical support specialists can provide assistance when planning and implementing your WebTitan deployment, and deciding on the correct authentication

options to ensure a smooth deployment. Through online documentation, telephone help, and direct email support, WebTitan ensures that your questions will be answered

in the fastest time possible. Access support information at http://helpdesk.webtitan.com/support/home

Revision History

Version Date Changes

1.0 December 2014 Initial Revision

Page 3: QuickStart Guide to Authentication

3

Contents

Introduction ................................................................................................................ 4

IP based authentication............................................................................................... 5

LDAP based authentication........................................................................................ 6

NTLM based authentication ....................................................................................... 8

WebTitan Active Directory Agent (WADA) ........................................................... 10

WADA Installation ............................................................................................... 11

Next Steps ............................................................................................................. 12

Page 4: QuickStart Guide to Authentication

4

Introduction

WebTitan provides the option to define how users authenticate themselves to

WebTitan before accessing external web sites.

By default, authentication is disabled, which means that any user is accepted by the

WebTitan appliance without authentication. Should authentication be required, it can be enabled via System Settings-> Authentication tab which can be seen below. The method of authentication can be selected from the 'Policy type' drop down list.

WebTitan provides various methods of user authentication which are as follows.

IP based authentication

LDAP based authentication

NTLM based authentication

IP and LDAP based authentication

IP and NTLM based authentication

NTLM authentication in Transparent Mode via WADA (WebTitan Active

Directory Agent)

Figure 1: Authentication settings

IP based authentication and NTLM based authentication are transparent to the user,

whereas LDAP based authentication will require the user to enter their LDAP username/password credentials on commencing web site browsing. They will only be asked once for this information.

Page 5: QuickStart Guide to Authentication

5

IP based authentication

IP based authentication is only suitable where the users have static IP addresses. Also,

it is recommended that either LDAP or NTLM authentication is used where LDAP servers are been used to maintain the users and groups within WebTitan. To facilitate

IP based authentication within WebTitan, the following must be done:

IP based authentication must be enabled via the System Settings > Authentication tab.

Users must be assigned IP addresses via the Users & Groups > Users tab. An IP address can be assigned at the time of user creation or by editing an existing user.

Figure 2 below shows that users can be assigned both a single IP address and an IP address range.

Figure 2: Add users dialog

IP authentication points

IP based authentication will be transparent to the end user.

IP based authentication should only be used for static IP addresses.

Page 6: QuickStart Guide to Authentication

6

LDAP based authentication

LDAP authentication is suitable for where the users and groups are being managed by

an LDAP server and where it is preferred that the user must enter their LDAP username/password credentials on commecing web site browsing.

To facilitate LDAP based authentication within WebTitan, the following must be done:

LDAP based authentication must be enabled via the System Settings >

Authentication tab.

There must be at least one LDAP server specified in the Users & Groups > Users

tab†.

The users associated with the authenticating LDAP server must be imported into WebTitan.

Figure 3 is a screen shot of LDAP based authentication turned on within WebTitan, which is then followed by figure 4 showing a screen shot of a user being prompted for

their LDAP credentials. They are only required to enter these credentials once.

Figure 3: LDAP authentication settings

† Please click here to see the 'QuickStart Guide to LDAP Setup' for details on how to connect to an LDAP server within WebTitan and also how to import LDAP users.

Page 7: QuickStart Guide to Authentication

7

Figure 4: LDAP Authentication popup from Internet Explorer

If the web user enters an incorrect username or password, then they will receive the following web page:

Figure 5: Failed authentication page

LDAP authentication points

LDAP based authentication requires the end user to enter their LDAP

credentials

Page 8: QuickStart Guide to Authentication

8

NTLM based authentication

If your network uses NTLM authentication, then the NTLM users can be

transparently authenticated against the WebTitan web filter using their Microsoft Windows credentials.

To facilitate NTLM based authentication within WebTitan, the following must be done.

NTLM based authentication must be enabled via the System Settings >

Authentication tab.

Users must browse using Internet Explorer or Mozilla Firefox.

Figure 6 below shows sample settings for an NTLM server. Verification of the settings occurs automatically once the 'Save' button is clicked.

Figure 6: NTLM authentication settings

If your NTLM server does not authenticate successfully, the following error codes

returned by WebTitan could be of use.

Error Code Explanation

-1 NTLM authentication isn't enabled.

-2 The username or password was not correct.

-3 Can't connect to domain controllers.

-4 /usr/local/bin/net join command failed with another reason.

-5 winbindd is not working(wbinfo -p).

-6 winbindd is not working correctly (wbinfo -t).

Page 9: QuickStart Guide to Authentication

9

NTLM authentication points

NTLM based authentication will be transparent to the end user.

NTLM based authentication only works with Internet Explorer and

Mozilla Firefox.

Users who do not match any NTLM user account will automatically be controlled by the 'Default' policy and will appear in reports as the

'GDefault' user.

Page 10: QuickStart Guide to Authentication

10

WebTitan Active Directory Agent (WADA)

The WebTitan Active Directory Agent (WADA) is a Windows service maintaining a list of active logon sessions, mapping an IP address to a username. This information is

then passed to WebTitan to allow user filtering rules to be applied based on the logged in users’ policy settings.

The information is gathered from 3 different sources that exist on Windows network:

LDAP

Event Logger

network sessions

The LDAP mechanism collects a list of computers in the domain and based on the lastLogon parameter will contact each computer using the WMI protocol to check for

active logon sessions and eventually get the username. Not all computers are checked, only those with lastLogon field within the range defined in the configuration (1 year

by default).

The Event Logger mechanism listens to the event logger for special events that contains information about username and IP.

Additionally, network sessions are enumerated (by default each 10 seconds) to discover active sessions. This method is important especially when there are users on

the network that don't turn-off their computers for a very long time and for some reason their computers are not reachable with WMI.

The results from all those methods are then merged into one list and transmitted to

WebTitan.

Page 11: QuickStart Guide to Authentication

11

WADA Installation

Install on the Active Directory Server or on another server in the domain. The

installation is a straight forward process using the MSI WADA kit as below.

Figure 7: WADA installation

Figure 8: WADA installation – accept the license

Figure 9: WADA installation - WebTitan server settings

Page 12: QuickStart Guide to Authentication

12

Enter the IP address of your WebTitan. NOTE: Specify the proxy port that WebTitan is listening on for HTTP requests. Default: 8881.

Figure 10: WADA installation - AD credentials

Finally enter your domain administration credentials for your Active Directory , e.g. copperf\admin / password.

Next Steps To implement transparent identification of users in transparent mode (Figure 11), you must configure the WebTitan appliance to operate in transparent mode, and have imported your users from Active Directory on the Users & Groups -> Users page

(Figure 12).

Page 13: QuickStart Guide to Authentication

13

Figure 11: Import users from Active Directory

Figure 12: Transparent mode proxy

On the System Setup -> Authentication page, it is sufficient to choose IP based authentication.