beautypg.com

Google Search Appliance Managing Search for Controlled-Access Content User Manual

Page 83

background image

Google Search Appliance: Managing Search for Controlled-Access Content

Index

83

Crawl and Index > Forms Authentication page 10,

11, 13, 57, 58, 59, 79, 80

crawler access 8, 54, 57
credential groups

client certificate-based authentication 24–25
configuring 20
connectors 33
cookie-based authentication 20–23
creating 19–20
default 19
description 16
group is optional option 20
HTTP-based authentication 23–24
Kerberos-based authentication 25–30
LDAP 33–36
name 61
require a user-name option 19
SAML 32
satisfaction 18

D

default credential group 19
deny decision, authorization 39
DENY, flexible authorization 39
DES encryption 28
des3-cbc-sha1 encryption 25
des-cbc-md5 encryption 26

E

encryption methods 25
exact-match URL rules 43, 44

F

feeds

web 54
with per-URL ACLs 42

file shares, SMB or CIFS 6
flexible authorization

allow decision 39
deny decision 39
indeterminate 39
rules 39
supported authorization mechanisms 39
using 39

follow and crawl URLs 54, 58
force secure connections when serving 37
forms authentication

cookie authentication 72
crawl method 6, 7
use case 57–59

G

group is optional option 20
group lookup 36

H

HEADREQUEST, flexible authorization 39

HTTP

artifact binding 32
header, cookie cracking 37, 71
POST binding 32

HTTP Basic

crawl configuration 79
crawl method 6, 7

HTTP-based authentication

description 23–24
serve method 6
use case 53–56

HTTPS

crawl 55
enable crawl and serve 12
serve 11
serve with HTTP Basic and NTLM HTTP 36

I

Identity Provider

description 31
public key 32

indeterminate decision 39
index

excluding content 49
secure content 9

Integrated Windows Authentication 6
Internet Explorer, configuring for Kerberos

authentication 30

K

Kerberos-based authentication

access method 6
configuring a search appliance 26
configuring Internet Explorer 30
configuring web browsers 30
cross-domain access 26
DES encryption 28
description 25–31
KDC 27
keytab file 27, 6
4
rc4 encryption 27
seach by authorized users 64
seach by unauthorized users 66
serve method 6
silent authentication 37
SMB 26
supported authorization mechanisms 27
supported encryption methods 25
use case 63–66
Windows content sources 26

Key Distribution Center (KDC) 27, 64

L

late binding 47
LDAP

enabling on a search appliance 35
integrating with a search appliance 34