McAfee QUICKCLEAN 1.0 Uživatelská příručka Strana 22

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 58
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 21
Identity theft — Since passwords are more prone to theft, certificates ensure that identity
information is valid and secure.
Unauthorized access — When certificates become compromised, they also become unusable.
Password maintenance — Avoid requiring users to maintain long lists of complex passwords that
are difficult to remember and easy to lose.
Integrated Windows authentication
Enterprise Authentication supports Integrated Windows authentication (IWA), which uses the Windows
client user information for authentication.
When users log on to the corporate network from their Windows client, Enterprise Authentication uses
IWA to grant access to protected resources with the Windows user authentication credentials.
IWA is helpful to:
Bypass initial logon prompts
Avoid transferring user credentials over the network
Context-aware authentication
Enterprise Authentication combines context-aware information with other authentication factors to
authenticate user identities.
To enable context-aware authentication, Enterprise Authentication uses this information:
Geographical location
Browser type
Operating system type
Example: To access online bank accounts, users enter a user name and password. When users access
their account outside their home location, the bank websites recognizes the new location using
context-based information. To securely validate the user identity, the bank website prompts users to
identify themselves using a user name, password, and several additional authentication methods.
Deployment checklist
To make sure that your network is ready to install Enterprise Authentication, review the deployment
checklist.
Table 4-3 Environment structure
Determine... Verified
The location of the network server where you plan to install the Enterprise Authentication
software
If you plan to install the Enterprise Authentication software in cluster. If so, gather the
following information for each cluster:
Choose a name for the cluster
Get the IP address for each server
Determine the seed servers
If you have firewalls running on the servers in your cluster, you must open the ports
used for communication
4
Plan your deployment
Deployment checklist
22
McAfee Enterprise Authentication 1.0.0 Product Guide
Zobrazit stránku 21
1 2 ... 17 18 19 20 21 22 23 24 25 26 27 ... 57 58

Komentáře k této Příručce

Žádné komentáře