beautypg.com

Google Search Appliance Security User Manual

Page 12

background image


12

All authorization mechanisms require User ID except Head Requests. The following table lists
authentication mechanisms that would result in a User ID:

Authentication mechanisms when user ID is required

HTTP
Basic/NTLM

It is listed as HTTP Basic/NTLM. However, these are the authentication protocols
used to verify the user credentials which happens between GSA and a back end
server. To the end user, it is forms authentication. After the user credentials are
verified by the configured “Sample URL”, the User ID entered by the user is treated
as the verified ID.

Client
Certificate

Certificate’s DN is passed as the verified ID.

Kerberos

The Windows user ID extracted from the Kerberos ticket is used as the verified
user ID.

SAML AuthN

The “Subject” passed by the SAML IDP is the verified ID.

LDAP
Authentication

User ID verified by the LDAP server is used as the verified ID.

Forms Authn
with Cookie
Cracking

User ID is passed back to the GSA by the Cookie Cracker. This involves some
coding where a simple dynamic web page needs to be implemented to pass this.

Connectors

Connector Framework provides the authentication SPI which returns a trusted User
ID. However, it must be implemented by the connector, which is optional. Not every
connector available provides authentication. Connector implementers can even
choose to require a password. For example, The File system connector 2.x requires
both the username and password in order to perform late binding authorization when
there are deny rules on documents.


All the authentication mechanisms above can be mixed with ACLs, Connector and SAML authorizations.
You can pick the one that fits customer requirements and is easiest to implement (also take into
consideration any silent authentication requirements).

For Head Request authorization, you cannot pick just any possible authentication mechanism as the head
requests are sent from the GSA to the content source, not by the client’s browser to the GSA. Depending
on the authentication protocol used by the content source, different credentials must be obtained by the
GSA during the user authentication process.