
Managing Authentication Settings
For enhanced security, you can enforce various methods of user authentication to operate in conjunction
with Remote Communication Gate S.
This section explains how to specify each available method, and how to change and display its settings.
• The authentication methods used in each server product are selected when that product is installed.
To change the selected authentication method, use the administration tool of that product.
•
If Windows Authentication (native or NT - compatible) is running, the domains to which the Remote
Communication Gate S server belongs and their trusted domains are available.
Specifying the Authentication Method
1. In the main window, click [Authentication Settings] to open the [Authentication System]
dialog box.
2. Under [Select an authentication system.], select the authentication method you want to
apply.
3. Configure the settings for the selected authentication method.
The settings vary depending on the authentication method. See the sections that follow for details
about the settings for each method.
• Only users who have Authentication Service Administrator permission can use this function.
When multiple server products are installed on the same server computer
Authentication
Management Service is shared. You must configure the authentication method on this
server (set own authentication).
When multiple server products are installed on different server computers
Authentication Management Service is installed separately on different server computers.
If this is the case, configure the authentication method using Authentication Management Service on
one of the servers (set own authentication).
You can configure Authentication Management Service on other servers to browse other services that
are set for own authentication (browse another authentication).
Basic Authentication
Use Basic authentication to add and manage individual authentication users. You can enforce user
authentication without a Windows domain, Notes domain, LDAP server, or NDS server.
9. Authentication Management
312
Komentarze do niniejszej Instrukcji