Users_usersSettingsView
Configuring Settings on Users > Settings
On this page, you can configure the authentication method required, global user settings, and an acceptable user policy that is displayed to users when logging onto your network.
Configuration instructions for the settings on this page are provided in the following sections:
User Login Settings
In the Authentication method for login drop-down list, select the type of user account management your network uses:
For information about using the local database for authentication, see Using Local Users and Groups for Authentication.
For detailed configuration instructions, see the following sections:
For information about using a RADIUS database for authentication, see Using RADIUS for Authentication.
For detailed configuration instructions, see Configuring RADIUS Authentication
For information about using an LDAP database for authentication, see Using LDAP / Active Directory / eDirectory Authentication.
For detailed configuration instructions, see Configuring LDAP Integration in SonicOS Enhanced
In the Single-sign-on method drop-down list, select one of the following:
For detailed SSO configuration instructions, see Configuring Single Sign-On.
For Browser NTLM authentication configuration, see Configuring Your SonicWALL Appliance for Browser NTLM Authentication.
In the Show user authentication page for field, enter the number of minutes that a user has to log in before the login page times out. If it times out, a message displays saying they must click before attempting to log in again.
Select Case-sensitive user names to enable matching based on capitalization of user account names.
Select Enforce login uniqueness to prevent the same user name from being used to log into the network from more than one location at a time. This setting applies to both local users and RADIUS/LDAP users. However the login uniqueness setting does not apply to the default administrator with the username admin.
Select Redirect users from HTTPS to HTTP on completion of login if you want users to be connected to the network through your SonicWALL appliance via HTTP after logging in via HTTPS. If you have a large number of users logging in via HTTPS, you may want to redirect them to HTTP, because HTTPS consumes more system resources than HTTP. If you deselect this option, you will see a warning dialog.
Select Allow HTTP login with RADIUS CHAP mode to have a CHAP challenge be issued when a RADIUS user attempts to log in using HTTP. This allows for a secure connection without using HTTPS, preventing the browser from sending the password in clear text over HTTP. Be sure to check that the RADIUS server supports this option.
Note: Administrators who log in using this method will be restricted in the management operations they can perform (because some operations require the appliance to know the administrator's password, which is not the case for this authentication method).
Select either Plain text or HTML for One-time password Email format, depending on your preference if you are using One-Time Password authentication.
User Session Settings
The settings listed below apply to all users when authenticated through the SonicWALL.
The User Login Status window displays the number of minutes the user has left in the login session. The user can set the remaining time to a smaller number of minutes by entering the number and clicking the Update button.
If the user is a member of the SonicWALL Administrators or Limited Administrators user group, the User Login Status window has a Manage button the user can click to automatically log into the SonicWALL appliance’s management interface. See Disabling the User Login Status Popup for information about disabling the User Login Status window for administrative users. See Configuring Local Groupsfor group configuration procedures.
Other Global User Settings
Allow these HTTP URLs to bypass users authentication access rules: Define a list of URLs users can connect to without authenticating. To add a URL to the list:
For wildcard matching, prefix with '*.' and/or suffix with '...', e.g.: *.windowsupdate.com...
To allow access to a file on any host, prefix with '*/', e.g.: */wpad.dat.
Auto-Configuration of URLs to Bypass User Authentication
You can use the Auto-Configure utility to temporarily allow traffic from a single specified IP address to bypass authentication. The destinations that traffic accesses are then recorded and used to allow that traffic to bypass user authentication. Typically this is used to allow traffic such as anti-virus updates and Windows updates. To auto-configure the URL bypass list, perform the following steps:
Tip: Windows Updates access some destinations via HTTPS, and those can only be tracked by IP address. However, the actual IP addresses accessed each time may vary and so rather than trying to set up a bypass for each such IP address, it may be better to use the Convert to network(s) option to set it up to allow bypass for HTTPS to all IP addresses in that network.
Tip: You may want to run updates multiple times in case the destinations that are accessed may vary.
Acceptable Use Policy
An acceptable use policy (AUP) is a policy that users must agree to follow in order to access a network or the Internet. It is common practice for many businesses and educational facilities to require that employees or students agree to an acceptable use policy before accessing the network or Internet through the SonicWALL.
The Acceptable Use Policy section allows you to create the AUP message window for users. You can use HTML formatting in the body of your message. Clicking the Example Template button creates a preformatted HTML template for your AUP window.
Acceptable use policy page content - Enter your Acceptable Use Policy text in the text box. You can include HTML formatting. The page that is displayed to the user includes an I Accept button or Cancel button for user confirmation.
Click the Example Template button to populate the content with the default AUP template, which you can modify:
<font face=arial size=3>
<center><b><i>Welcome to the SonicWALL</center></b></i>
<font size=2>
<table width="100%" border="1">
<tr><td>
<font size=2>
<br><br><br>
<center>Enter your usage policy terms here.
<br><br><br>
</td></tr>
</table>
Click "I Accept" only if you wish to accept these terms and continue,
or otherwise select "Cancel".
Click the Preview button to display your AUP message as it will appear for the user.
Customize Login Pages
SonicOS now provides the ability to customize the text of the login authentication pages that are presented to users. Administrators can translate the login-related pages with their own wording and apply the changes so that they take effect without rebooting.
Although the entire SonicOS interface is available in different languages, sometimes the administrator does not want to change the entire UI language to a specific local language.
However, if the firewall requires authentication before users can access other networks, or enables external access services (e.g. VPN, SSL-VPN), those login related pages usually should be localized to make them more usable for typical users.
The Customizable Login Page feature provides the following functionality:
The following login-related pages can be customized:
To customize one of these pages, perform the following steps:
Note: The "var strXXX =" lines in the template pages are customized JavaScript Strings. You can change them into your preferring wonrding. Modifications should follow the JavaScript syntax. You can also edit the wording in the HTML section.
Leave the Login Page Contents field blank and apply the change to revert the default page to users.
Caution: Be careful to verify the HTML of your custom login page before deploying it, because HTML errors may cause the login page to not function properly.An alternative login page is always available for the administrator, in case a customized login page has any issues. To access the alternate login page, manually input the URL: https://(device_ip)/defauth.htmldirectly into the address line of browser (case sensitive). The default login page without any customization is then displayed, allowing you to login as normal and reset your customized login related pages.