Account management
|
Create an account using an Active Directory
user that can log into the web console, including a
user with full administrative rights.
|
Notification templates
|
Deep Discovery Web
Inspector can
insert Active Directory user or group names into the
%USER% and %USER_GROUP % tokens used in applicable
notification templates.
|
Policy matching using traffic source
|
Use Active Directory users or groups to
match policy traffic using the traffic source
criteria.
|
HTTPS Inspection rule matching using
traffic source
|
Use Active Directory users or groups to
match HTTPS inspection policy traffic using the
decryption source criteria.
|
Web access and Captive Portal
authentication
|
Deep Discovery Web
Inspector can use Active Directory users
or groups for authentication when end-users access
web resources.
If Deep Discovery Web Inspector cannot
transparently authenticate an end-user, then the
user can use Active Directory credentials to log on
through Captive Portal.
|
NoteNTLM authentication is only supported in the default domain.
|
NoteDeep Discovery Web
Inspector
discovers Active Directory servers by querying DNS servers for
service records (SRV). You must ensure that the DNS servers
configured in Deep Discovery Web
Inspector contain the appropriate
“_gc._tcp” or “_ldap._tcp” records.
|
ImportantIf the service account's password is expired, authentication will
not work. Be sure to update the service account's password
before it expires.
|