SonicOS 7.1 Users
- SonicOS 7.1
- About SonicOS
- About User Management
- Using Local Users and Groups for Authentication
- Using RADIUS for Authentication
- Using LDAP/Active Directory/eDirectory Authentication
- Using RADIUS
- Using TACACS+
- Using Single Sign-On
- What is Single Sign-On?
- Benefits of SonicWall SSO
- Platforms and Supported Standards
- How Does Single Sign-On Work?
- How Does SSO Agent Work?
- How Does Terminal Services Agent Work?
- How Does Browser NTLM Authentication Work?
- How Does RADIUS Accounting for Single-Sign-On Work?
- Installing the Single Sign-On Agent and/or Terminal Services Agent
- Single Sign-On Advanced Features
- Configuring Access Rules
- Managing SonicOS with HTTP Login from a Terminal Server
- Viewing and Managing SSO User Sessions
- Multiple Administrator Support
- Configuring Users Status
- Configuring User Settings
- User Login Settings
- Setting the Authentication Method for Login
- Configuring RADIUS Authentication
- Configuring LDAP
- Configuring TACACS+
- Requiring User Names be Treated as Case-Sensitive
- Preventing Users From Logging in from More than One Location
- Forcing Users to Log In Immediately After Changing Their Passwords
- Displaying User Login Information Since the Last Login
- Setting the Single-Sign-On Methods
- One-Time Password Settings
- Configuring the User Web Login Settings
- Adding URLs to Authentication Bypass
- User Session Settings
- Accounting
- [[[Missing Linked File System.LinkedTitle]]]
- User Login Settings
- Configuring and Managing Partitions
- Configuring Local Users and Groups
- Configuring Guest Services
- Configuring Guest Accounts
- Managing Guest Status
- SonicWall Support
Configuring the CA on the Active Directory Server
To configure the CA on the Active Directory server
Skip the first five steps if Certificate Services are already installed.
- Navigate to Start > Settings > Control Panel > Add/Remove Programs.
- Select Add/Remove Windows Components.
- Select Certificate Services.
- When prompted, Select Enterprise Root CA.
-
Enter the requested information.
For information about certificates on Windows systems, see http://support.microsoft.com/kb/931125.
- Launch the Domain Security Policy application by
- Navigate to Start > Run.
- Run the command: dompol.msc.
- Open Security Settings > Public Key Policies.
- Right click Automatic Certificate Request Settings.
- Select New > Automatic Certificate Request.
- Step through the wizard, and select Domain Controller from the list.
Was This Article Helpful?
Help us to improve our support portal