Solved

Sonicwall SSO Agent accuracy for multiple users sharing PC.

Posted on 2014-12-10
6
194 Views
Last Modified: 2015-01-27
Hi,

We currently have a NSA 240 running 5.9.0.4-127o with SSO agents running Directory Connector 3.6.56.  The problem we have is when user A logs off a PC and user B logs in, the sonicwall still has the active session of user A.  User B then also has the CFS policy assigned to user A.  We are using NetAPI for the query source which seems to be the most accurate in my tests using the Directory Connector Diag tool, even though it says its supposed to be the least accurate.  If I kill the users session in the sonicwall the new users CFS policy is correctly identified but this would be a hassle to manage.  

Has anyone had a better experience using WMI or DC logs when multiple users share a PC with different CFS policies?

Thanks in advance.
0
Comment
Question by:RHNOC
6 Comments
 
LVL 62

Expert Comment

by:gheist
ID: 40493694
you can have user logout script that logs them out from soncwall
0
 
LVL 63

Expert Comment

by:btan
ID: 40493742
Shouldnt the logoff of user from machine also consider session as logoff. I was seeing this below on the SSO configuration and supposedly
Log out from the windows domain computer and log in back with a user from either the full access or restricted access groups and check whether the policy is getting enforced correctly for the user.
https://support.software.dell.com/kb/sw7782

There is a CleWMI vbs that can query current login user but not sure that can help to officiate log off or remap policy. For shared PC, it is not recommended to hold active session once user logoff.
https://support.software.dell.com/kb/sw7363
(more WMI query) http://msdn.microsoft.com/en-us/library/aa394586(v=vs.85).aspx

I also understand there is polling time to poll the workstation running SSO Agent to verify that users are still logged on. Wondering if there are a timeout for inactive session to terminate session though
https://support.software.dell.com/kb/sw5952
0
 
LVL 62

Accepted Solution

by:
gheist earned 500 total points
ID: 40494074
Ask support why your installation does not meet documentation and how to make it work...
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 
LVL 39

Expert Comment

by:Aaron Tomosky
ID: 40494102
If you use the directory connector (which I highly recommend) it has a refresh time
http://help.mysonicwall.com/sw/eng/6931/ui2/25500/PANEL_ssoProps.html
0
 

Author Comment

by:RHNOC
ID: 40573122
Well I ended up calling support and when they dialed in we could not get the SSO to fail.  After one minute, which is the polling rate the SSO would identify the new user and the CFS policy would change.  Although I still had the same problem occur a few weeks later where the SSO would test correctly but the sonicwall would not release the current users session.  So unfortunately I never came to a solid conclusion.  Thanks for the replies.
0
 
LVL 62

Expert Comment

by:gheist
ID: 40573134
So for some reason polling is stopped at some moment? Power saving? clock adjustments...
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
wallet files similar to ransomware 1 105
Radius Debug Error 16 102
How to take over, control, & secure a network 9 91
Creating a Vendor Admin user 23 80
#Citrix #Citrix Netscaler #HTTP Compression #Load Balance
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

792 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question