Skip to main content
Smoothwall Help Centre
Status page
Submit a request
Sign in
Sign in
Status page
Submit a request
Smoothwall Help Centre
Authentication
About Authentication
About Authentication
Articles
Important: Support for NTLM Authentication Methods
Microsoft has deprecated the following New Technology LAN Manager (NTLM) components: Negotiate Kerberos/NTLM, includi...
About authentication and authentication policies
Authentication determines who the user is and their group membership, if configured or received from an external sou...
See users currently authenticated with Smoothwall
See a list of end users who have authenticated with Smoothwall On-Premise Appliance services on the Services > Authen...
When to use Authentication Exceptions
Web requests are usually required to pass an authentication check. Smoothwall Appliance then: Matches the user with ...
Authentication Methods
Authentication is used to identify the end user and apply the right policies. When adding authentication policies, yo...
User Identification is wrong and users browse with the wrong access
Some authentication methods reliably detect when a user begins browsing, but struggle to detect when they have sto...
Using Transparent versus Non-Transparent Proxying
In transparent mode, there are no special configuration steps needed to setup client browsers, thus allowing the pro...
What's the main difference between transparent and non-transparent proxies?
Overview The choice between using a transparent proxy or a non-transparent proxy is often made based on convenience. ...
Built-in User Groups: Default users, Banned users and Unauthenticated IPs
User Groups can be used in Web Proxy Authentication Policies to manage how Smoothwall Filter authenticates users, and...
Identifying Users on the Smoothwall Filter & Firewall
This articles talks about the different options for setting up user identification in the Smoothwall Filter and Fire...