Setting Up User Authentication
Set up User Authentication by following these steps.
1. | Create the necessary users and groups required for authentication, then install the user database. |
2. | Ensure that the appropriate Security Servers are enabled in $FWDIR/conf/fwauthd.conf. |
3. | Create the appropriate rule(s) in the rulebase. |
4. | Configure the User Authentication action properties. |
5. | Configure the Rulebase Properties Authentication frame. |
6. | Verify and install the policy. |
After creating your users, verify that the appropriate Security Servers are enabled in $FWDIR/conf/fwauthd.conf. By default, they should be enabled, but it never hurts to check. The lines for the servers you want to enable should be present and not commented out (i.e., the line should ...
Get Essential Check Point™ FireWall-1® NG: An Installation, Configuration, and Troubleshooting Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.