Document toolboxDocument toolbox

Setting Up Access Authentication

To set up automated security policy management using access authentication, do the following:

  1. Set up the IdP you plan to use and create applications and user group attributes in the IdP. Refer to the respective vendor documentation for details.
  2. Review the prerequisites for using different protocols and IdPs. For more information, see Prerequisites for Configuring Access Authentication.
  3. Create access authentication profiles that define the protocol and IdP you want to use. For more information, see Configuring Authentication Profiles.
  4. Associate an authentication profile with the host on which you want to set up access authentication. For more information, see Associating Authentication Profiles with Hosts.
  5. Enable the access authentication and DNS forwarding proxy services on the host to which you want to apply security policies. For more information, see Enabling and Disabling Services on Hosts.
    Note that enabling the access authentication service might affect the existing DNS service. Contact Infoblox Technical Support for assistance in enabling the access authentication service. Once the service is enabled, all users will be redirected to the Access Authentication page for authentication before any DNS resolution can happen.

  6. Configure authentication settings if you want to modify the landing page of the captive portal for your users by presenting a login page that contains the required access authentication. For more information, see Configuring Authentication Settings.
  7. Obtain the admin token and domain from the third-party IdP you have selected in the authentication profile. Depending on the IdP, refer to the respective vendor documentation on how to obtain the admin token and domain.
  8. Synchronize user groups from the third-party IdP using the admin token and domain you retrieved from the IdP, or enable MS AD Sync if you have configured an LDAP profile. For more information, see Synchronizing User Groups.

  9. Create or modify security policies to include specific user groups to which you want to apply the security policies. For more information, see Creating Security Policies.

For more information about access authentication, see the following: