This article applies to our On-Premise Appliance Filter and Firewall product only, not to Cloud.
Authentication is used to identify the end user and apply the right policies. When adding authentication policies, you can use the listed authentication methods.
Authentication methods work with Transparent proxies (where the client device does not know a proxy exists, limiting the types of authentication that can be used), Non-transparent proxies (where clients have proxy settings explicitly set, so the proxy can ask the client for authentication for every request), or both.
Non-transparent authentication policies require devices to be configured to use the specified Authentication Method, whereas Transparent authentication policies don’t.
No authentication
Users are only identified by their IP address. All requests are assigned to the Unauthenticated IPs user group.
This can be used with both Transparent and Non-transparent proxies.
External authentication
These methods don't rely on the proxy asking the client applications to provide authentication, so no authentication bypass is needed. These methods are configured independently of the proxy, and work exactly the same with both Transparent and Non-transparent proxies.
Advantages:
- Automatic authentication and identification.
- No bypass issues when applications cannot respond to a proxy authentication request.
- It can be combined with Indirect proxy authentication to authenticate users before they start browsing.
Disadvantages:
- Additional setup is required.
- Users could be misidentified if the setup is incorrect.
Methods:
- IDex Agent: When a user signs in, the IDex Agent tells Smoothwall not to ask who they are because the IDex software installed on domain controllers sends user sign-in events to Smoothwall instead.
- Kerberos Authentication Scripts: When a user signs in, the scripts tell Smoothwall that the proxy does not need to ask the user who they are. The sign-in refreshes automatically every two minutes.
- RADIUS: When a user signs into the Wi-Fi network, they are also signed into Smoothwall by RADIUS. This option is usually used for Bring-your-own (BYO) devices.
Direct proxy authentication
These methods require users to authenticate for every session and new connection. When using one of these methods, you must add Authentication Exceptions for any software that does not support authentication.
These methods can only be used with a Non-transparent proxy.
Advantages:
- Automatic authentication and identification.
Disadvantages:
- The application has to support the authentication method, or you’ll need to bypass authentication.
Terminal Services compatibility mode
Each direct proxy authentication has a standard version and a Terminal Services compatibility mode version.
Terminal Services compatibility mode is for network devices using Microsoft Terminal Services (Remote Desktop Connections), where multiple users can connect from the same IP address. Every request has to be identified to track user activity accurately.
You must not use a terminal services compatibility mode Authentication Method when using Firewall rules for specific User Groups, as authentication won’t work as expected.
Methods
Method | Description |
Negotiate Kerberos/NTLM and Negotiate Kerberos/NTLM (Terminal Services compatibility mode) |
The device selects the most secure authentication method it supports between Kerberos or NTLM. Requirements:
|
Kerberos and Kerberos (Terminal Services compatibility mode) |
This method identifies users using the Kerberos keytab added to Smoothwall Filter. See Adding Kerberos keytabs. |
Proxy authentication and Proxy authentication (Terminal Services compatibility mode) |
This method identifies users by requesting a username and password when they first use their web browser. These details are encoded in all future requests made through the browser. For each connection, the browser supplies a header which the server can ask for if it's not already present. |
NTLM identification and NTLM identification (Terminal Services compatibility mode) |
Identifies users based on the username used to sign in to their Windows-based device. Requirements:
Important NTLM identification doesn't verify a user's credentials, so it should only be used where all devices are secured and members of a Windows domain. |
NTLM authentication and NTLM authentication (Terminal Services compatibility mode) |
Identifies users based on the username used to sign in to their Windows-based device and validates their credentials with the domain controller. Requirements:
|
Indirect proxy authentication/identification
These methods only require a user to authenticate once for the duration of the sign-in timeout value (found on the Services > Authentication > Settings page). When using these methods, you can:
- Advise users to keep their browsers open and regularly browse to prevent timeout.
- Set the timeout to a reasonable value. It should be long enough to cover when devices change hands but short enough so users are not asked to re-authenticate an unreasonable number of times. Your organisation should decide this, but the default is 10 minutes.
These methods can be used with a Non-transparent or Transparent proxy, apart from Negotiate Kerberos/NTLM (via redirect), which must be used with a Transparent proxy.
Advantages:
- Automatic authentication and identification.
- They can be combined with External authentication.
Disadvantages:
- Users can be misidentified if another user uses the system before the sign-in expires.
- Using this method can cause issues with applications that don’t support proxy authentication/identification methods, such as the app ceasing to work or users not being authenticated
- The authentication service supports only one user per device IP address.
Method | Availability | Description |
Redirect users to SSL Login page (with background tab) Redirect users to SSL Login page (with session cookie) Redirect users to non-SSL login page (with background tab) Redirect users to non-SSL login page (with session cookie) |
These methods are not available in Maiden:
|
Important We recommend using the Redirect users to SSL Login page (with session cookie) option with a HTTPS certificate. The non-SSL option isn't secure because it uses HTTP to submit the username and password. This method identifies users with the authentication service and sends this encrypted information to Smoothwall. If no user is signed in, web requests are redirected to the SSL login page or non-SSL login page, where users must enter their username and password. Smoothwall stores a session cookie on the user’s browser, removing the need for the user to re-authenticate or leave the SSL login page open. Because of this, this method is best used for tablet PCs and other mobile devices that can’t keep tabs in browsers open in the background.
|
Negotiate Kerberos/NTLM (via redirect) | he device selects the most secure authentication method it supports between Kerberos or NTLM. Requirements:
|
|
Kerberos (via redirect) | This method identifies users with the authentication service. If no user is signed in, web requests are redirected to the Kerberos sign-in page, which obtains the username signed into their Windows-based device. See Adding Kerberos keytabs. The authentication service supports only one user per device IP address. |
|
Smart redirect | Not available in Maiden. If you need help, contact Smoothall Support. | This method identifies the user’s device and redirects them to an NTLM authentication or SSL login service. The System > Authentication > User Activity page shows the authentication method used instead of Smart redirect. Note The redirect is based on the User-Agent data received in the browser’s HTTP header packet and is a best-guess scenario based on pattern matching and compatibility. |
NTLM identification (via redirect) | This method identifies users with the authentication service. If no user is signed in, web requests are redirected to the NTLM sign-in page, which obtains the username signed into their Windows-based device. The authentication service supports only one user per device IP address. |
|
NTLM authentication (via redirect) | This method identifies users with the authentication service. If no user is signed in, web requests are redirected to the NTLM sign-in page, which obtains the username signed into their Windows-based device and validates their credentials with the domain controller. The authentication service supports only one user per device IP address. |
Other Authentication methods
Method | Availability | Description | Policy Type |
Core authentication |
Important You should use Core authentication alongside an External authentication method.
|
Both | |
Ident | Not available in Maiden. If you need help, contact Smoothall Support. | Ident identifies users with the username returned by a server on their device and does not verify credentials. Once the Ident server identifies the user, Smoothwall filters their web activity according to their User Group. | Both |
Identification by location | Not available in Maiden. Instead, use Location Objects in the Where step of an Authentication Policy. | This method identifies users by IP address and assigns a User Group based on the Identification by Location policy. | Both |
Global Proxy using NTLM | This method identifies users with NTLM credentials when signed into the Secure Global Proxy service. You can implement device authentication using certificates on your devices.
|
Non-Transparent |