Revision: 6167 http://ipcop.svn.sourceforge.net/ipcop/?rev=6167&view=rev Author: eoberlander Date: 2011-12-17 17:42:55 +0000 (Sat, 17 Dec 2011) Log Message: ----------- Add Marco's text and screenshots for proxy identd Authentication section. Update broken links.
Modified Paths: -------------- IPCopDoc/trunk/en/admin/xml/proxy.xml Added Paths: ----------- IPCopDoc/trunk/en/admin/images/proxy-identd-all.png IPCopDoc/trunk/en/admin/images/proxy-identd-common.png IPCopDoc/trunk/en/admin/images/proxy-identd-user.png Added: IPCopDoc/trunk/en/admin/images/proxy-identd-all.png =================================================================== (Binary files differ) Property changes on: IPCopDoc/trunk/en/admin/images/proxy-identd-all.png ___________________________________________________________________ Added: svn:mime-type + application/octet-stream Added: IPCopDoc/trunk/en/admin/images/proxy-identd-common.png =================================================================== (Binary files differ) Property changes on: IPCopDoc/trunk/en/admin/images/proxy-identd-common.png ___________________________________________________________________ Added: svn:mime-type + application/octet-stream Added: IPCopDoc/trunk/en/admin/images/proxy-identd-user.png =================================================================== (Binary files differ) Property changes on: IPCopDoc/trunk/en/admin/images/proxy-identd-user.png ___________________________________________________________________ Added: svn:mime-type + application/octet-stream Modified: IPCopDoc/trunk/en/admin/xml/proxy.xml =================================================================== --- IPCopDoc/trunk/en/admin/xml/proxy.xml 2011-12-17 16:16:02 UTC (rev 6166) +++ IPCopDoc/trunk/en/admin/xml/proxy.xml 2011-12-17 17:42:55 UTC (rev 6167) @@ -57,8 +57,222 @@ <sect2 id="proxy-auth-identd"> <title>identd Authentication</title> <para> - Content to be written... + This authentication method is the preferred solution for environments + where: </para> + <itemizedlist> + <listitem> + <para> + Authentication must be a <quote>hidden</quote> process without + entering username and password. + </para> + </listitem> + <listitem> + <para> + The proxy service must operate in transparent mode. + </para> + </listitem> + <listitem> + <para> + Usernames will be used only for logging rather than for + authentication. + </para> + </listitem> + </itemizedlist> + <para> + The identd authentication method requires an <command>identd</command> + service or daemon running on the client. + Unlike other authentication methods, identd comes without the + <quote>Global authentication settings</quote> section. + </para> + <para> + <mediaobject> + <imageobject role="fo"> + <imagedata fileref="&imagepath;proxy-identd-all.&imageext;" + format="PNG" + contentwidth="14cm"/> + </imageobject> + <imageobject role="html"> + <imagedata fileref="&imagepath;proxy-identd-all.&imageext;" format="PNG" align="center"/> + </imageobject> + <textobject> + <phrase>identd Authentication section</phrase> + </textobject> + </mediaobject> + </para> + <para> + In addition to the authentication you can define positive or negative + user based access control lists. + </para> + + <sect3 id="proxy-auth-identd-prereq"> + <title>Client-side prerequisites</title> + <para> + Most Linux based clients already have an ident daemon + (<command>identd</command>) installed by default. + </para> + <para> + For Windows clients, there are several free <command>identd</command> + implementations available. + This one works for Windows XP and Vista: + <ulink url="http://rndware.info/products/windows-ident-server.html">rndware's Windows Ident Server</ulink> + </para> + <note> + <para> + Port 113 (TCP) must be opened on client based firewalls. + </para> + </note> + </sect3> + + <sect3 id="proxy-auth-identd-common"> + <title>Common identd settings</title> + <para> + <mediaobject> + <imageobject role="fo"> + <imagedata fileref="&imagepath;proxy-identd-common.&imageext;" + format="PNG" + contentwidth="14cm"/> + </imageobject> + <imageobject role="html"> + <imagedata fileref="&imagepath;proxy-identd-common.&imageext;" format="PNG" align="center"/> + </imageobject> + <textobject> + <phrase>Common identd settings section</phrase> + </textobject> + </mediaobject> + </para> + <formalpara> + <title><guilabel>Require identd authentication</guilabel></title> + <para> + By default, <command>identd</command> authentication will not + be mandatory. + This configuration can be useful for logging purposes. + If you want to use <command>identd</command> for enforced + authentication, this option must be enabled. + Access for clients which don't authenticate using + <command>identd</command> will be denied. + </para> + </formalpara> + <note> + <para> + The proxy cannot run in transparent mode when using + <command>identd</command> authentication. + </para> + </note> + <formalpara> + <title><guilabel>Require authentication for unrestricted source addresses</guilabel></title> + <para> + If <quote>Require ident authentication</quote> is enabled, + authentication will be also required for unrestricted + IP addresses. + If you don't want to require authentication for + unrestricted addresses, untick this box. + </para> + </formalpara> + <formalpara> + <title><guilabel>Ident timeout</guilabel></title> + <para> + Maximum time in seconds for the Proxy to wait for + ident lookups to be completed. + </para> + </formalpara> + <formalpara> + <title><guilabel>Ident aware hosts</guilabel></title> + <para> + This enables ident lookups for the listed client addresses. + Client addresses that are not listed here will not receive + ident requests. + </para> + </formalpara> + <note> + <para> + Unlisted clients will gain access without authentication, + even if the option <quote>Require ident authentication</quote> + is enabled. + </para> + </note> + <formalpara> + <title><guilabel>Destinations without authentication</guilabel> (optional)</title> + <para> + This allows you to define a list of destinations that can be + accessed without authentication. + </para> + </formalpara> + <note> + <para> + Any domains listed here are destination DNS domains and not + source Windows NT domains. + </para> + </note> + <para> + Examples: + </para> + <para> + Entire domains and subdomains + </para> + <screen><computeroutput>*.example.net +*.google.com</computeroutput></screen> + <para> + Single hosts + </para> + <screen><computeroutput>www.example.net +www.google.com</computeroutput></screen> + <para> + IP addresses + </para> + <screen><computeroutput>81.169.145.75 +74.125.39.103</computeroutput></screen> + <para> + URLs + </para> + <screen><computeroutput>www.example.net/download +www.google.com/images</computeroutput></screen> + <note> + <para> + You can enter all of these destination types in any order. + </para> + </note> + </sect3> + + <sect3 id="proxy-auth-identd-user"> + <title>User based access restrictions</title> + <para> + <mediaobject> + <imageobject role="fo"> + <imagedata fileref="&imagepath;proxy-identd-user.&imageext;" + format="PNG" + contentwidth="14cm"/> + </imageobject> + <imageobject role="html"> + <imagedata fileref="&imagepath;proxy-identd-user.&imageext;" format="PNG" align="center"/> + </imageobject> + <textobject> + <phrase>User based access restrictions section</phrase> + </textobject> + </mediaobject> + </para> + <formalpara> + <title><guilabel>Enabled</guilabel></title> + <para> + Enables access control lists for authorized or unauthorized + users. + </para> + </formalpara> + <formalpara> + <title><guilabel>Use positive access control / Authorized users</guilabel></title> + <para> + The users listed here will be allowed web access. + For all other users, access will be denied. + </para> + </formalpara> + <formalpara> + <title><guilabel>Use negative access control / Unauthorized users</guilabel></title> + <para> + The listed users will be blocked from web access. + For all other users, access will be allowed. + </para> + </formalpara> + </sect3> </sect2> <sect2 id="proxy-auth-ldap"> This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site. ------------------------------------------------------------------------------ Learn Windows Azure Live! Tuesday, Dec 13, 2011 Microsoft is holding a special Learn Windows Azure training event for developers. It will provide a great way to learn Windows Azure and what it provides. You can attend the event by watching it streamed LIVE online. Learn more at http://p.sf.net/sfu/ms-windowsazure _______________________________________________ Ipcop-svn mailing list Ipcop-svn@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/ipcop-svn