Manage Users, Authentication, and VPN Certificates
492
ProSAFE Dual WAN Gigabit WAN SSL VPN Firewall FVS336Gv3
Configure Authentication Domains, Groups, and User
Accounts
The following sections provide information about configuring authentication domains, groups,
and user accounts:
• Manage Authentication Domains
• Manage Authentication Groups
• Manage User Accounts
• Manage User Login Policies
• Change Passwords and Automatic Logout Period
Manage Authentication Domains
The following sections provide information about managing authentication domains:
• Authentication Domains Overview
• Add an Authentication Domain
• Change an Authentication Domain
WiKID WiKID Systems is a PAP or CHAP key-based two-factor authentication method that
functions with public key cryptography. The client sends an encrypted PIN to the WiKID
server and receives a one-time passcode with a short expiration period. The client logs in
with the passcode. See Appendix C, Two-Factor Authentication, for more information
about WiKID authentication.
NT Domain A network-validated domain-based authentication method that functions with a Microsoft
Windows NT Domain authentication server. This authentication method is superseded by
Microsoft Active Directory authentication but is supported to authenticate legacy
Windows clients.
Active Directory A network-validated domain-based authentication method that functions with a Microsoft
Active Directory authentication server. Microsoft Active Directory authentication servers
support a group and user structure. Because the Active Directory supports a multilevel
hierarchy (for example, groups or organizational units), this information can be queried to
provide specific group policies or bookmarks based on Active Directory attributes.
Note: A Microsoft Active Directory database uses an LDAP organization schema.
LDAP A network-validated domain-based authentication method that functions with a
Lightweight Directory Access Protocol (LDAP) authentication server. LDAP is a standard
for querying and updating a directory. Because LDAP supports a multilevel hierarchy (for
example, groups or organizational units), this information can be queried to provide
specific group policies or bookmarks based on LDAP attributes.
Table 9. External authentication protocols and methods (continued)
Authentication
Protocol or Method
Description
Comments to this Manuals