Revision: 6167
          http://ipcop.svn.sourceforge.net/ipcop/?rev=6167&view=rev
Author:   eoberlander
Date:     2011-12-17 17:42:55 +0000 (Sat, 17 Dec 2011)
Log Message:
-----------
Add Marco's text and screenshots for proxy identd Authentication section. 
Update broken links.

Modified Paths:
--------------
    IPCopDoc/trunk/en/admin/xml/proxy.xml

Added Paths:
-----------
    IPCopDoc/trunk/en/admin/images/proxy-identd-all.png
    IPCopDoc/trunk/en/admin/images/proxy-identd-common.png
    IPCopDoc/trunk/en/admin/images/proxy-identd-user.png

Added: IPCopDoc/trunk/en/admin/images/proxy-identd-all.png
===================================================================
(Binary files differ)


Property changes on: IPCopDoc/trunk/en/admin/images/proxy-identd-all.png
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: IPCopDoc/trunk/en/admin/images/proxy-identd-common.png
===================================================================
(Binary files differ)


Property changes on: IPCopDoc/trunk/en/admin/images/proxy-identd-common.png
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: IPCopDoc/trunk/en/admin/images/proxy-identd-user.png
===================================================================
(Binary files differ)


Property changes on: IPCopDoc/trunk/en/admin/images/proxy-identd-user.png
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Modified: IPCopDoc/trunk/en/admin/xml/proxy.xml
===================================================================
--- IPCopDoc/trunk/en/admin/xml/proxy.xml       2011-12-17 16:16:02 UTC (rev 
6166)
+++ IPCopDoc/trunk/en/admin/xml/proxy.xml       2011-12-17 17:42:55 UTC (rev 
6167)
@@ -57,8 +57,222 @@
     <sect2 id="proxy-auth-identd">
     <title>identd Authentication</title>
     <para>
-        Content to be written...
+        This authentication method is the preferred solution for environments 
+        where:
     </para>
+    <itemizedlist>
+        <listitem>
+            <para>
+                Authentication must be a <quote>hidden</quote> process without 
+                entering username and password.
+            </para>
+        </listitem>
+        <listitem>
+            <para>
+                The proxy service must operate in transparent mode.
+            </para>
+        </listitem>    
+        <listitem>
+            <para>
+                Usernames will be used only for logging rather than for 
+                authentication.
+            </para>
+        </listitem>
+    </itemizedlist>
+    <para>
+        The identd authentication method requires an <command>identd</command>
+        service or daemon running on the client.
+        Unlike other authentication methods, identd comes without the 
+        <quote>Global authentication settings</quote> section.
+    </para>
+        <para>
+        <mediaobject>
+            <imageobject role="fo">
+                <imagedata fileref="&imagepath;proxy-identd-all.&imageext;"
+                                   format="PNG"
+                                   contentwidth="14cm"/>
+            </imageobject>
+            <imageobject role="html">
+                <imagedata fileref="&imagepath;proxy-identd-all.&imageext;" 
format="PNG" align="center"/>
+            </imageobject>
+            <textobject>
+                <phrase>identd Authentication section</phrase>
+            </textobject>
+        </mediaobject>
+        </para>
+    <para>
+        In addition to the authentication you can define positive or negative 
+        user based access control lists.
+    </para>
+
+    <sect3 id="proxy-auth-identd-prereq">
+    <title>Client-side prerequisites</title>
+    <para>
+        Most Linux based clients already have an ident daemon 
+        (<command>identd</command>) installed by default.
+    </para>
+    <para>
+        For Windows clients, there are several free <command>identd</command> 
+        implementations available.
+        This one works for Windows XP and Vista:
+        <ulink 
url="http://rndware.info/products/windows-ident-server.html";>rndware&apos;s 
Windows Ident Server</ulink>
+    </para>
+    <note>
+        <para>
+            Port 113 (TCP) must be opened on client based firewalls.
+        </para>
+    </note>
+    </sect3>
+
+    <sect3 id="proxy-auth-identd-common">
+    <title>Common identd settings</title>
+        <para>
+        <mediaobject>
+            <imageobject role="fo">
+                <imagedata fileref="&imagepath;proxy-identd-common.&imageext;"
+                                   format="PNG"
+                                   contentwidth="14cm"/>
+            </imageobject>
+            <imageobject role="html">
+                <imagedata fileref="&imagepath;proxy-identd-common.&imageext;" 
format="PNG" align="center"/>
+            </imageobject>
+            <textobject>
+                <phrase>Common identd settings section</phrase>
+            </textobject>
+        </mediaobject>
+        </para>
+        <formalpara>
+            <title><guilabel>Require identd authentication</guilabel></title>
+            <para>
+                By default, <command>identd</command> authentication will not 
+                be mandatory. 
+                This configuration can be useful for logging purposes.
+                If you want to use <command>identd</command> for enforced 
+                authentication, this option must be enabled. 
+                Access for clients which don&apos;t authenticate using
+                <command>identd</command> will be denied.
+            </para>
+        </formalpara>
+        <note>
+            <para>
+                The proxy cannot run in transparent mode when using
+                <command>identd</command> authentication.
+            </para>
+        </note>
+        <formalpara>
+            <title><guilabel>Require authentication for unrestricted source 
addresses</guilabel></title>
+            <para>
+                If <quote>Require ident authentication</quote> is enabled, 
+                authentication will be also required for unrestricted 
+                IP addresses. 
+                If you don&apos;t want to require authentication for 
+                unrestricted addresses, untick this box.
+            </para>
+        </formalpara>
+        <formalpara>
+            <title><guilabel>Ident timeout</guilabel></title>
+            <para>
+                Maximum time in seconds for the Proxy to wait for
+                ident lookups to be completed.
+            </para>
+        </formalpara>
+        <formalpara>
+            <title><guilabel>Ident aware hosts</guilabel></title>
+            <para>
+                This enables ident lookups for the listed client addresses. 
+                Client addresses that are not listed here will not receive
+                ident requests.
+            </para>
+        </formalpara>
+        <note>
+            <para>
+                 Unlisted clients will gain access without authentication, 
+                 even if the option <quote>Require ident authentication</quote>
+                is enabled.
+            </para>
+        </note>
+        <formalpara>
+            <title><guilabel>Destinations without authentication</guilabel> 
(optional)</title>
+            <para>
+                This allows you to define a list of destinations that can be 
+                accessed without authentication.
+            </para>
+        </formalpara>
+        <note>
+            <para>
+                Any domains listed here are destination DNS domains and not 
+                source Windows NT domains.
+            </para>
+        </note>
+        <para>
+            Examples:
+        </para>
+        <para>
+            Entire domains and subdomains
+        </para>        
+            <screen><computeroutput>*.example.net
+*.google.com</computeroutput></screen>
+        <para>
+            Single hosts
+        </para>        
+            <screen><computeroutput>www.example.net
+www.google.com</computeroutput></screen>
+        <para>
+            IP addresses
+        </para>        
+            <screen><computeroutput>81.169.145.75
+74.125.39.103</computeroutput></screen>
+        <para>
+            URLs
+        </para>        
+            <screen><computeroutput>www.example.net/download
+www.google.com/images</computeroutput></screen>
+        <note>
+            <para>
+                You can enter all of these destination types in any order.
+            </para>
+        </note>
+    </sect3>
+
+    <sect3 id="proxy-auth-identd-user">
+    <title>User based access restrictions</title>
+        <para>
+        <mediaobject>
+            <imageobject role="fo">
+                <imagedata fileref="&imagepath;proxy-identd-user.&imageext;"
+                                   format="PNG"
+                                   contentwidth="14cm"/>
+            </imageobject>
+            <imageobject role="html">
+                <imagedata fileref="&imagepath;proxy-identd-user.&imageext;" 
format="PNG" align="center"/>
+            </imageobject>
+            <textobject>
+                <phrase>User based access restrictions section</phrase>
+            </textobject>
+        </mediaobject>
+        </para>
+        <formalpara>
+            <title><guilabel>Enabled</guilabel></title>
+            <para>
+                Enables access control lists for authorized or unauthorized 
+                users.
+            </para>
+        </formalpara>
+        <formalpara>
+            <title><guilabel>Use positive access control / Authorized 
users</guilabel></title>
+            <para>
+                The users listed here will be allowed web access. 
+                For all other users, access will be denied.
+            </para>
+        </formalpara>
+        <formalpara>
+            <title><guilabel>Use negative access control / Unauthorized 
users</guilabel></title>
+            <para>
+                The listed users will be blocked from web access.
+                For all other users, access will be allowed.
+            </para>
+        </formalpara>
+    </sect3>
     </sect2>
 
     <sect2 id="proxy-auth-ldap">

This was sent by the SourceForge.net collaborative development platform, the 
world's largest Open Source development site.


------------------------------------------------------------------------------
Learn Windows Azure Live!  Tuesday, Dec 13, 2011
Microsoft is holding a special Learn Windows Azure training event for 
developers. It will provide a great way to learn Windows Azure and what it 
provides. You can attend the event by watching it streamed LIVE online.  
Learn more at http://p.sf.net/sfu/ms-windowsazure
_______________________________________________
Ipcop-svn mailing list
Ipcop-svn@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/ipcop-svn

Reply via email to