Identifying Authentication Sources for Users

Establishing and using secure connections with requesting browsers ensures that no one except the person using the requesting browser can read the content sent from the appliance.

However, having a secure connection does not ensure that the person using the browser is someone who should be accessing your confidential data. The user's identity must be verified by a trusted authentication source.

You must plan how to verify, or authenticate, the identity of each user requesting access to secure content.

You can eliminate most of the overhead of authentication by using existing databases. Excelerator authentication can leverage both LDAP-compliant and RADIUS databases.

For help in creating authentication profiles, see Setting Up Authentication Profiles .