beautypg.com

Using silent authentication, Using cookie cracking – Google Search Appliance Managing Search for Controlled-Access Content User Manual

Page 37

background image

Google Search Appliance: Managing Search for Controlled-Access Content

37

2.

Choose Administration > SSL Settings. Scroll down to Force secure connections when serving?.

To return results in the protocol used by the original search query, choose No. This option is the
least secure.

To force the search appliance to use HTTPS for secure content only, choose Use HTTPS when
serving secure results, but not when serving public results
.

To force the search appliance to use HTTPS for all content, choose Use HTTPS when serving
both public and secure results
. This option is the most secure.

3.

Click Save Setup.

Using Silent Authentication

With silent authentication, users are authenticated without being directed to a login page. The following
table lists methods that provide silent authentication. Some methods produce a primary verified
identity (see “Primary Verified Identity” on page 17). Because a primary verified identity is required for
policy ACLs (see “Policy Access Control Lists” on page 40), these methods can be used with them. The
methods that do not produce a primary verified identity cannot be used with policy ACLs, SAML, or
connectors.

Using Cookie Cracking

If a credential group requires a user name for an authenticated user, you can implement silent
authentication for content in the credential group (see “Credential Groups” on page 16) by using cookie
cracking. Google recommends using the Require a user-name? option (see “Require a User-Name
Option” on page 19)
when you are using policy ACLs, authorization results caching, SAML authorization,
or connector authorization. When you use cookie cracking, inbound cookie forwarding (from the
content server to the search appliance) provides a username and or group.

To implement cookie cracking, if a sample URL check for user credentials is successful, the web server
that runs the sample URL page generates the following response HTTP header (in addition to the
standard headers):

X-Username:value
X-Groups: value1, value2

where value becomes a verified identity for the credential group that is associated with the sample
URL.

Method

Description

Cookie-based

If Require a user-name? (see “Require a User-Name Option” on page 19) is not
checked, inbound cookie forwarding provides silent authentication without a
primary verified identity; it cannot be used with policy ACLs, SAML, or
connectors.

If Require a user-name? (see “Require a User-Name Option” on page 19) is
checked, then silent authentication can only be achieved with cookie cracking
(see “Using Cookie Cracking” on page 37).

Kerberos

Authentication is always silent, produces a verified identity, group data can only
from the internal GData-based database.

SAML

Can be silent, depending on how the SAML server is configured, produces a
primary verified identity, can return group data.

x.509 https client
certificate

Authentication is always silent, always produces a primary verified identity,
group data can only from the internal GData-based database.