Important note about SSL VPN compatibility for 20.0 MR1 with EoL SFOS versions and UTM9 OS. Learn more in the release notes.

Sophos Firewall: Authentication Methods

FormerMember
FormerMember

Disclaimer: This information is provided as-is for the benefit of the Community. Please contact Sophos Professional Services if you require assistance with your specific environment.


Hotspot

Clientless Users

  • Clientless users don’t authenticate using a username and password but are identified purely by their IP address. Clientless users are always authenticated locally by the Sophos Firewall Firewall. Typically, you would use clientless users to control network access for servers or devices such as printers and VoIP phones. You can also configure people as clientless users, for example, senior executives, for whom you don't want to require a sign-in when they're within the network. If you configure users rather than network devices, we recommend you map the users with static IP addresses on your DHCP server.
  • You can create clientless users individually or as a group. You can then edit each user's configuration and specify the policies and bandwidth usage.
  • Clientless users appear as live users in current activities. If you deactivate these users, they don't appear as live users.

Single-Sign-On (SSO)

The Sophos Firewall Firewall has several methods for authenticating users for single sign-on:

Sophos Authentication for Terminal Client(STAS)

Sophos Authentication for Terminal/Thin Client (SATC)

Synchronized User Identity

  • Synchronized user ID authentication uses the Security Heartbeat to authenticate endpoint users.
  • Synchronized user ID works with Active Directory (AD) configured as an authentication server in Sophos Firewall and is currently supported for Windows 7 and 10. No agents are required on the server or clients, nor does it share or use any password information. The synchronized user ID doesn't work with other directory services or recognize local users. The synchronized user ID shares the domain user account information from the endpoint device the user is signed in to with Sophos Firewall via Security HeartbeatSophos Firewall then checks the user account against the configured AD server and activates the user.
  • Sophos Endpoint Protection passes Windows sign-in information to Sophos Firewall, which uses this information to authenticate against AD. This authentication triggers user-based policies and general user authentication on the firewall.

VPN SSO

RADIUS SSO

  • The Sophos Sophos Firewall Firewall can transparently authenticate users who have already been authenticated on an external RADIUS server. The firewall does not interact with the RADIUS server; it simply monitors the RADIUS accounting records it sends. These records generally include the user’s IP address and user group.

Kerberos/NTLM SSO

Chromebook SSO

  • Sophos Firewall provides a Chromebook extension that shares Chromebook user IDs with the Firewall to turn on full user-based policy enforcement and reporting.

Authentication Agent

Web (Captive Portal) Authentication




Revamped
[edited by: Erick Jan at 5:23 AM (GMT -8) on 21 Nov 2024]
Parents Reply Children
No Data