-
Basic components of authentication, authorization, and auditing configuration
-
Authentication methods
-
Web Application Firewall protection for VPN virtual servers and authentication virtual servers
-
On-premises NetScaler Gateway as an identity provider to Citrix Cloud
-
Authentication, authorization, and auditing with commonly used protocols
-
Troubleshoot authentication and authorization related issues
This content has been machine translated dynamically.
Dieser Inhalt ist eine maschinelle Übersetzung, die dynamisch erstellt wurde. (Haftungsausschluss)
Cet article a été traduit automatiquement de manière dynamique. (Clause de non responsabilité)
Este artículo lo ha traducido una máquina de forma dinámica. (Aviso legal)
此内容已经过机器动态翻译。 放弃
このコンテンツは動的に機械翻訳されています。免責事項
이 콘텐츠는 동적으로 기계 번역되었습니다. 책임 부인
Este texto foi traduzido automaticamente. (Aviso legal)
Questo contenuto è stato tradotto dinamicamente con traduzione automatica.(Esclusione di responsabilità))
This article has been machine translated.
Dieser Artikel wurde maschinell übersetzt. (Haftungsausschluss)
Ce article a été traduit automatiquement. (Clause de non responsabilité)
Este artículo ha sido traducido automáticamente. (Aviso legal)
この記事は機械翻訳されています.免責事項
이 기사는 기계 번역되었습니다.책임 부인
Este artigo foi traduzido automaticamente.(Aviso legal)
这篇文章已经过机器翻译.放弃
Questo articolo è stato tradotto automaticamente.(Esclusione di responsabilità))
Translation failed!
Authentication methods
The NetScaler appliance can authenticate users with local user accounts or by using an external authentication server. The appliance supports the following authentication types:
- LOCAL: Authenticates to the NetScaler appliance by using a password, without reference to an external authentication server. User data is stored locally on the NetScaler appliance.
- RADIUS: Authenticate to an external RADIUS server.
- LDAP: Authenticates to an external LDAP authentication server.
- TACACS: Authenticates to an external Terminal Access Controller Access-Control System (TACACS) authentication server.
- CERT: Authenticates to the NetScaler appliance by using a client certificate, without reference to an external authentication server.
-
NEGOTIATE: Authenticates to a Kerberos authentication server. If there is an error in Kerberos authentication, NetScaler uses NTLM authentication.
-
SAML: Authenticates to a server that supports the Security Assertion Markup Language (SAML).
-
SAML IDP: Configures the NetScaler to serve as a Security Assertion Markup Language (SAML) Identity Provider (IdP).
-
WEB: Authenticates to a web server, providing the credentials that the web server requires in an HTTP request and analyzing the web server response to determine that the user authentication was successful.
-
Native OTP: NetScaler appliance supports one-time passwords (OTPs) without having to use a third-party server.
-
Push notification: NetScaler Gateway supports push notifications for OTP. Users do not have to manually enter the OTP received on their registered devices to log in to NetScaler Gateway. Admins can configure NetScaler Gateway such that login notifications are sent to users’ registered devices using push notification services.
-
Email OTP: The Email OTP method enables you to authenticate using the one-time password (OTP) that is sent to the registered email address. When you try to authenticate on any service, the server sends an OTP to the registered email address of the user.
-
reCaptcha authentication - NetScaler Gateway supports a new first class action ‘captchaAction’ that simplifies reCaptcha configuration. As reCaptcha is a first class action, it can be a factor of its own. You can inject reCaptcha anywhere in the nFactor flow.
-
nFactor authentication: Multifactor authentication enhances the security of an application by requiring users to provide multiple proofs of identity to gain access. The NetScaler appliance provides an extensible and flexible approach to configuring multifactor authentication. This approach is called nFactor authentication.
- OAuth authentication: OAuth authentication authorizes and authenticates users to services that are hosted on applications such as Google, Facebook, and Twitter.
Share
Share
In this article
This Preview product documentation is Cloud Software Group Confidential.
You agree to hold this documentation confidential pursuant to the terms of your Cloud Software Group Beta/Tech Preview Agreement.
The development, release and timing of any features or functionality described in the Preview documentation remains at our sole discretion and are subject to change without notice or consultation.
The documentation is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making Cloud Software Group product purchase decisions.
If you do not agree, select I DO NOT AGREE to exit.