Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. From the Cloud Services Portal, click Manage > On-Prem Hosts.  
  2. Select an on-prem host from the list and click Service > Access Authentication > Configure.
  3. In the Configure Access Authentication dialog, click Add and choose an authentication profile from the list. Note that you can only add multiple profiles if they are of different protocol types and you can enable only one profile for each on-prem host. 
  4. To enable or disable a profile for exclusion, select a tagged IP space from among the list of available IP spaces. Next, choose a Tagged Authentication Mode from the following:  
    • Disabled: Tagged authentication control is disabled. All clients must authenticate use. 
    • Exclusions: Clients from the address scopes are tagged for exclusion bypass authentication. Other clients must authenticate. 
    • Inclusions: Clients from the address scopes tagged for inclusion must authenticate. Other clients bypass authentication.
    • Both: Clients from the address scopes tagged for inclusion or from untagged scopes must authenticate. Clients from the scopes tagged for exclusion bypass authentication. 
  5. Click Save & Close.

Access Authentication Exclusions

Access authentication exclusion is used to bypass the authentication process for desired devices. This is useful for devices which cannot otherwise be authenticated. By adding these devices to a subnet or to an IP address or IP addresses within a block, and then excluding the subnet or IP addresses from the authentication process, the devices are excluded from going through the authentication process.

...