With IWSVA, if you want to use a user/group-based policy and you have an LDAP server
               on the network, choose the User/Group Authentication Setting. Contact your LDAP administrator
               for information about the various LDAP attribute settings.
            Select your preferred method of user identification for reports, logs, notification
               messages, and for creating scan policies.
            
               
               User/Group Authentication Settings
               
               Basic (single Active Directory server)
               
               With IWSVAs enhanced LDAP functionality, several settings for Microsoft’s Active Directory
                  can automatically be detected that will simplify your configuration. Many use Microsoft
                  Active Directory; this might be the best option for those with less-complex configurations.
               
               Under the Basic view, only the following settings are necessary:
               
               
                  - 
                     
                     Domain name 
- 
                     
                     Service account 
- 
                     
                     Password 
Your LDAP vendor must use Microsoft Active Directory for the auto-detect function
                  to work correctly. IWSVA automatically detects all the available servers for any given
                  domain and then chooses the most appropriate one for your configuration, as well as
                  other important settings.
               
               IWSVA does auto-detection as follows:
               
               
                  - 
                     
                     Acquires the LDAP server list through a DNS query 
- 
                     
                     Filters out unconnected servers 
- 
                     
                     The fastest GC or DC will be selected as the primary LDAP server when more than one
                        GC or DC is located among LDAP servers. 
- 
                     
                     Domain names will be translated into BDN. 
- 
                     
                     Kerberos information is generated and authenticated. 
Advanced (other or multiple LDAP servers)
               
               Use this option to do fine-grained or complex LDAP configurations. Besides Active
                  Directory, other LDAP servers as well as multi-domain forests and redundant LDAP servers
                  are supported in the Advanced (other or multiple LDAP servers) view. You can add multiple domains for User/Group Authentication. IWSVA sequentially
                  queries these domains for user identification and policy enforcement.
               
               To use Advanced (other or multiple LDAP servers) from the web console, click Administration > IWSVA Configuration > User Identification and check Advanced(other or multiple LDAP servers) in User Identification.
               
               You can add, remove, or edit domain configurations from the Advanced (other or multiple LDAP servers) view, and create a list that shows all the configured domains. View the details of
                  any one domain by clicking the domain name or the down-array button.
               
               
                  
                     
                        |  | Note
                              
                              IWSVA cannot check whether a domain is a sub-domain. If you specify two domains, one
                                 is going to be the other’s sub-domain, but IWSVA treats them as independent domains. | 
                  
                
               
               To configure the New LDAP Configuration page:
               
               
                  - 
                     
                     Enable Advanced (other or multiple LDAP servers) and click Add New Domain or any existing LDAP domain name to view the details. 
- 
                     
                     Enter or edit the following: 
                        
                           
                              |  | Note
                                    
                                    The default encryption method is None. If LDAP server supports LDAPv3 StartTLS extension
                                       or LDAP over SSL, select the appropriate encryption method. |  
 
 
- 
                     
                     For the Authentication Method, select one that meets your expectations, then enter
                        your Kerberos domain or realm, the Kerberos server, and the Kerberos port. 
- 
                     
                     For Authentication High Availability, you can enable additional server relationships
                        for the same domain by selecting Enable additional LDAP servers for the same domain. Set the server relationship (Round Robin or Fail-over) and enter the names of any
                        additional backup LDAP servers. 
Configuring one domain is a considerable undertaking. To complete a simple configuration,
                  use the auto-detect button provided in the Basic view. It automatically fills the
                  form. You can modify the domain configuration base on the output of an auto-detected
                  configuration. This button is only available for Microsoft Active Directory users
                  in the Basic view.
               
               To some extent, the authentication method settings depend on the LDAP vendor. Some
                  authentication methods are only valid for certain vendors. The following table shows
                  their relationship.
               
               Sync with LDAP Servers
               
               Pressing this button initiates a manual synchronization with the LDAP server to synchronize
                  the user group information. This icon appears after successfully adding a new domain.
               
               LDAP Vender Authentication Method Relationships
               
               
                  
                     
                        
                           |  | Active Directory | OpenLDAP | 
                        
                           | Simple | No | Yes | 
                        
                           | Kerberos | Yes | Yes | 
                        
                           | Digest - MD5 | No | Yes | 
                     
                  
                
               
               IWSVA supports high availability for LDAP authentication. You can specify one backup
                  LDAP server that shares the same configuration with the primary one. However, two
                  high availability modes are supported:
               
               
                  - 
                     
                     Round Robin: By default, IWSVA alternately authenticates users with all LDAP servers. 
- 
                     
                     Fail-over: When the primary server is down, IWSVA refers to other servers to authenticate
                        users. Each domain can configure only one BDN and LDAP server type, and the BDN should be
                        unique from other domains.  When multiple domains are supported, you can use any account that belongs to any
                        domain to log in. At first, IWSVA checks the domain names, then authenticates users
                        for the matched domain name server. If no domain name has been input, it will use
                        the first one as the default login domain name. 
After your configuration is ready, click Save. Click Cancel to start over. After successfully saving your configuration, return to the LDAP server
                  list.
               
               The following conditions cannot be saved; you will be prompted with a corresponding
                  error message:
               
               
                  - 
                     
                     No LDAP servers present 
- 
                     
                     No BDN listed 
- 
                     
                     Missing administrator account or password 
- 
                     
                     Missing authentication information when choosing Advanced Authentication Mode 
- 
                     
                     Failing to pass the LDAP connection test 
Global Authentication Cache Settings
               
               Fixed TTL -The expiration time for each record in the Client IP to User ID cache is different.
                  When a record's life reaches its expiration time, this record is purged. The expiration
                  time for a record is calculated as follows:
               
               Expiration time = Record generation time + Fixed TTL
               
               Last active TTL -When adding a record into the Client IP to User ID cache, this record has a pre-configured
                  expiration interval, for example, 360 seconds. Before reaching the expiration time,
                  if this record is hit, the expiration interval for this record is refreshed and becomes
                  360 seconds again. If a record is not hit during the expiration interval, this record
                  is purged.
               
               By default, Last Active TTL is enabled.
               
               Standard Authentication Method
               
               Standard Authentication can be configured by selecting Standard Authentication (provided
                  by the operating system or browser) option on the Administration > IWSVA Configuration > User Identification screen from the Web console.
               
               In Standard Authentication, authentication is implemented through the authentication
                  features provided by OS or browser.
               
               When the client participates in the domain accesses to Web through the browser supporting
                  NTLM authentication, no pop-up window appears to request authentication since the
                  authentication information is automatically sent from the browser.
               
               If the client does not participate the domain, the browser does not support NTLM authentication,
                  or automatic authentication is disabled by the browser, pop-up will appear to request
                  authentication since automatic authentication is not implemented.
               
               Captive Portal
               
               IWSVA uses two authentication methods:
               
               
               
               To configure Captive Portal, select the Captive Portal (Custom Authentication Page
                  delivered by IWSVA to browser) option on the Administration > IWSVA Configuration > User Identification screen from the Web console.
               
               If the Captive Portal is configured, custom authentication page appears, and authentication
                  will be requested when the client participates in the domain accesses to Web for the
                  first time (automatic authentication will not be implemented transparently).
               
               The login interface screen can be customized. The screen appears when users access
                  the restricted network for the first time or users are not recognized by IWSVA.
               
               Advanced Mode
               
               IWSVA also provides an Advanced mode to create a customized Captive Portal - by writing
                  your own HTML. However, at the very least the following Java Script must first be
                  inserted into the customized Captive Portal:
               
               function accesspolicy(){var str1 = window.location.href;//alert(str1);var s=str1.indexOf("?forward=");//alert(s);var d=str1.indexOf("&IP");//alert(d);var uri=str1.substring(s+9,d)+"/$$$GUEST_POLICY$$$";//alert(uri);return uri;}User name:Password:If you are a guest, please select the Guest Access option to access the Internet
               
               This Java Script is required for the Authentication Form, the Guest Access button,
                  and the Event Handler to appear. Without this script, users will be unable to pass
                  the authentication.
               
               Allow Guest Login
               
               You can enable guest access when the Allow Guest Login box is checked. When enabled, an additional button labeled Guest appears. Guests can access the Internet by selecting this button, however, their
                  behavior is under the control of the guest policy. The guest policy automatically
                  appears when guest access is enabled in the policy list. Otherwise, it is invisible.
               
               To allow guest access:
               
               
                  - 
                     
                     In the Authentication Method section, select the Captive Portal (Custom Authentication Page delivered by IWSVA to browser) option. 
- 
                     
                     Click the Allow Guest Login checkbox. 
- 
                     
                     You can predesign a "look" for the Captive Portal page and save it as HTML. Match
                        the look and feel of your own corporate branding through the use of colors, logos,
                        and text. Copy and paste your customized HTML code into the empty box. Use the <%cred%>
                        tag to display the login credentials and guest access buttons. 
- 
                     
                     Click Preview Login Screen to view your results. 
- 
                     
                     Click Save to preserve your settings. 
Cookie Mode
               
               Cookie mode is used for user identification in NAT and terminal server environments.
                  To use Cookie Mode, ensure that Adobe Flash Player has been installed on the client
                  machine and that browser cookies are enabled.
               
               Cookie Mode is only available when user/group authentication is enabled and Captive
                  Portal is selected.
               
               Use the "Stay signed in" option on the Captive Portal login page to enable cookie
                  "lifetime" for up to one year. If the "Stay signed in" option is not selected, cookie
                  "lifetime" is one day.
               
               None
               
               (Not recommended) Logged events and reports will be anonymous; URL Filtering and other
                  policies are created based on IP addresses.
               
               See also: