SonicOS 7.0 Users
- SonicOS 7.0 Users
- About User Management
- Using Local Users and Groups for Authentication
- Using RADIUS for Authentication
- Using LDAP/Active Directory/eDirectory Authentication
- Using RADIUS
- Using TACACS+
- Using Single Sign-On
- What is Single Sign-On?
- Benefits of SonicWall SSO
- Platforms and Supported Standards
- How Does Single Sign-On Work?
- How Does SSO Agent Work?
- How Does Terminal Services Agent Work?
- How Does Browser NTLM Authentication Work?
- How Does RADIUS Accounting for Single-Sign-On Work?
- Installing the Single Sign-On Agent and/or Terminal Services Agent
- Single Sign-On Advanced Features
- Configuring Access Rules
- Managing SonicOS with HTTP Login from a Terminal Server
- Viewing and Managing SSO User Sessions
- Multiple Administrator Support
- Configuring Users Status
- Configuring User Settings
- User Login Settings
- Setting the Authentication Method for Login
- Configuring RADIUS Authentication
- Configuring LDAP
- Configuring TACACS+
- Requiring User Names be Treated as Case-Sensitive
- Preventing Users From Logging in from More than One Location
- Forcing Users to Log In Immediately After Changing Their Passwords
- Displaying User Login Information Since the Last Login
- Setting the Single-Sign-On Methods
- One-Time Password Settings
- Configuring the User Web Login Settings
- Adding URLs to Authentication Bypass
- User Session Settings
- Accounting
- [[[Missing Linked File System.LinkedTitle]]]
- User Login Settings
- Configuring and Managing Partitions
- Configuring Local Users and Groups
- Configuring Guest Services
- Configuring Guest Accounts
- Managing Guest Status
- SonicWall Support
SSO Agents
To set the single-sign-on methods
- Navigate to the Device > Users > Settings > Authentication page.
- Next to Configure SSO, click Configure.
The SSO Configuration page is displayed.
-
Under the SSO Agents tab, to add a agent click Add Agent.
-
In the Settings tab, enter the following:
-
Enter Host Name or IP Address.
-
Enter Port.
-
Enter Shared Key
-
Re-enter the shared key in the Confirm Shared Key field.
-
Enter Timeout (seconds), default is 5 seconds.
-
Enter Retries, default is 3 seconds.
-
-
In the Advanced tab, enter Maximum requests to send at a time.
-
Click Save.
-
Under the General Settings tab, select the following:
-
Enable Enable SSO agent authentication to use the SSO Agent for user authentication. This setting is enabled by default.
-
Enable Try next agent on getting no name from NetAPI/WMI to force a retry of the authentication via a different SSO agent if there is no response or error from the first agent. This only affects agents using NetAPI/WMI. This setting is disabled by default.
-
Enable Don't block user traffic while waiting for SSO to use the default policy while the user is being identified. This prevents browsing delays. This setting is disabled by default.
-
On enabling Don't block user traffic while waiting for SSO, the Including for is enabled and allows traffic affected by access rules that require user authentication, while waiting for user identification. Select anyone of the following:
-
All access rules
-
Selected access rules
-
-
Select anyone of the following in When agent synchronize their user databases
-
Sync those with the same user identification mechanisms:To synchronize only those databases using the same identification mechanism; this is the default.
-
Sync all agents: To synchronize together no matter what identification mechanisms they use, thus giving a single, homogenous user database duplicated on every agent.
-
-
- Click Add Service User Names to add a windows service user names.
Enter the name in Enter New Service Users Name.
Click Save.
The list of Windows service user names in the User names used by Windows services is listed in the windows services table.
- Click Save.
Was This Article Helpful?
Help us to improve our support portal