Solved

Does TMG2010 support LDAP authentication for outbound web access

Posted on 2012-03-23
8
434 Views
Last Modified: 2012-03-27
Hi,

does anybody know if TMG already supports outbound LDAP authentication? Until beta1 of TMG it was officially announced as unsupported? It is working fine for inbound connections (publishing rules).


Thanks
0
Comment
Question by:TsolovD
  • 4
  • 2
  • 2
8 Comments
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 37759337
Not sure if I am undertanding your question. LDAP and AD authentication has been supported from day 1 of TMG RTM release and can be selected under the Users tab of the access rule.
0
 

Author Comment

by:TsolovD
ID: 37764560
I mean if I can use LDAP authentication for outbound web access rules? For example I want to create URL Set with denied sites and apply it to a user or group.
0
 
LVL 29

Expert Comment

by:pwindell
ID: 37765952
I believe the answer is no.
LDAP is only available for certain types in inbound Auth (AFAIK)
0
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 400 total points
ID: 37767080
Right-click the outbound access rule and select properties.
Select the Users tab
Click add - click new - this will run the new user set wizard
Give it a name
Select Add
select type (choose from radius, ldap, SecurID or AD)


Don't forget to remove any other authentication options such as all users etc
0
IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

 
LVL 29

Expert Comment

by:pwindell
ID: 37767384
Ah! Ok.
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 37767394
:)
0
 

Author Comment

by:TsolovD
ID: 37770958
Thank you Keith.
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 37771067
Welcome :)
0

Featured Post

6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Join & Write a Comment

Meet the world's only “Transparent Cloud™” from Superb Internet Corporation. Now, you can experience firsthand a cloud platform that consistently outperforms Amazon Web Services (AWS), IBM’s Softlayer, and Microsoft’s Azure when it comes to CPU and …
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now