Allow iPhone Safara through Forefront with HTTP authorization

I am using Microsoft ForeFront TMG 2010 SP2 to access internet.

One of the rules looks lke this:
From: Local network
TO: Internet
Protocols: HTTP/HTTPS
Users: Authenticated users.
This rule is used to authorize users while accessing the web. (and have usernames in logs).

Is there a way to allow Safari browsers (e.g on iPhone) to access internet (HTTP) wile on WiFi? Safari is unable to authorize. Any ideas?
Ivica VugrinecAsked:
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Keith AlabasterEnterprise ArchitectCommented:
No one is seriously going to put such devices on their internal network - that would be lunacy.
Add another nic to the TMG box and let the internal wifi connect to that interface instead. Lets say you gave this a address range.
Create a new network set in the TMG gui (for example wifi) for the ip addresses associated with the new network set.
In the new network set properties, add -
Create http/httpsd access rule from wifi to external.
Create dns access rule from wifi to external

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
Lunacy abounds at our place.   I have people that have bought "i-Stuff" and think they can run those things on our LAN.  When I tell them that Home-User "toys" don't work on a corporate LAN where authentication is required they think it is something that I arbitrarily decided on my own and "made it so",...they can't comprehend the fact that these devices just flat out are not capable.  Then inevitably I hear from them that they know of someone else's network allows them to work,...then how do I explain to them that the other people's network has dropped their security to let it happen and that it is a stupid thing to do?,...then they think I should be just as stupid with ours.  In their minds security is not something that protects them and keeps them safe, is just something that "gets in the way".

Anyway, GrdiRuda:

You have to allow anonymous outbound access for those to work. What Keith is describing is about the only way to do it safely,...but then,...just wait,...pretty soon the users with wireless nics in their machines will discover that they can connect thier machine to that same wireless device and get around your authentication, don't give anyone the WAP Key, can enter it into the "i-Stuff" yourself without letting them know what it was (assuming the "i-stuff" won't let them see it afterwards).
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Microsoft Forefront ISA Server

From novice to tech pro — start learning today.