beautypg.com

Net use based authentication process, Tier 1: single sign-on authentication – 8e6 Technologies Enterprise Filter Authentication R3000 User Manual

Page 215

background image

A

PPENDIX

A: A

UTHENTICATION

O

PERATIONS

T

IER

1: S

INGLE

S

IGN

-O

N

A

UTHENTICATION

8

E

6 T

ECHNOLOGIES

, R3000 I

NTERNET

F

ILTER

A

UTHENTICATION

U

SER

G

UIDE

201

Tier 1: Single Sign-On Authentication

Net use based authentication process

The following diagram and steps describe the operations of

the net use based user authentication process:

Fig. A-1 Net use based authentication module diagram

1. The user logs on the network from a Windows worksta-

tion (also known as “client” or “machine”).

2. The authentication server on the network sends the

user’s workstation a login script containing a net use
command.

3. The execution of this net use command causes the

Windows workstation to create an “IPC share”
(command exchange) with the R3000 filter box as a
shared network device.

NOTE: When the IPC share is created, no drives are mapped in
this share.