Dell SonicWall SRA 4200 Administrator's Manual
Download Administrator's manual of Dell 4200 Desktop, Gateway for Free or View it Online on All-Guides.com. This version of Dell 4200 Manual compatible with such list of devices, as: 4200, SonicWall SRA 4200, SonicWall SRA 1200, SonicWall SRA 1600, SonicWall SRA 4600
Brand: Dell
Category: Desktop , Gateway , Network Hardware , Server
Type: Administrator's manual
Model: Dell 4200 , Dell SonicWall SRA 4200 , Dell SonicWall SRA 1200 , Dell SonicWall SRA 1600 , Dell SonicWall SRA 4600
Pages: 440
154 | SRA 6.0 Administrator’s Guide
–
Active Directory user name: %ADUSERNAME%
–
Wildcard: %WILDCARD%
Step 10 Select the Delete external user accounts on logout check box to delete users who are not
logged into a domain account after they log out.
Step 11 Select the Auto-assign groups at login check box to assign users to a group when they log in.
Users logging into Active Directory domains are automatically assigned in real time to SRA
groups based on their external AD group memberships. If a user’s external group membership
has changed, their SRA group membership automatically changes to match the external group
membership.
Step 12 Optionally, select the One-time passwords check box to enable the One Time Password
feature. A drop-down list will appear, in which you can select if configured, required for all
users, or using domain name. These are defined as:
• if configured - Only users who have a One Time Password email address configured will
use the One Time Password feature.
• required for all users - All users must use the One Time Password feature. Users who do
not have a One Time Password email address configured will not be allowed to login.
• using domain name - Users in the domain will use the One Time Password feature. One
Time Password emails for all users in the domain will be sent to [email protected].
Step 13 If you selected if configured or required for all users in the One-time passwords drop-down
list, the Active Directory AD e-mail attribute drop-down list will appear, in which you can select
mail, mobile, pager, userPrincipalName, or custom. These are defined as:
• mail - If your AD server is configured to store email addresses using the “mail” attribute,
select mail.
• mobile or pager - If your AD server is configured to store mobile or pager numbers using
either of these attributes, select mobile or pager, respectively. Raw numbers cannot be
used, however, SMS addresses can.
• userPrincipalName - If your AD server is configured to store email addresses using the
“userPrincipalName” attribute, select userPrincipalName.
• custom - If your AD server is configured to store email addresses using a custom attribute,
select custom. If the specified attribute cannot be found for a user, the email address
assigned in the individual user policy settings will be used. If you select custom, the
Custom attribute field will appear. Type the custom attribute that your AD server uses to
store email addresses. If the specified attribute cannot be found for a user, the email
address will be taken from their individual policy settings.
If you select using domain name, an E-mail domain field appears below the drop-down list.
Type in the domain name where one-time password emails will be sent (for example, abc.com).
Step 14 Select the type of user from the User Type drop-down list. All users logging in through this
domain will be treated as this user type. The choices depend on user types defined already.
Some possible choices are:
• External User – Users logging into this domain are treated as normal users without
administrative privileges.
• External Administrator – Users logging into this domain are treated as administrators,
with local SRA admin credentials. These users are presented with the admin login page.
This option allows the SRA administrator to configure a domain that allows SRA admin
privileges to all users logging into that domain.
Dell SonicWALL recommends adding filters that allow administrative access only to those
users who are in the correct group. You can do so by editing the domain on the Users >
Local Groups page.