O'Reilly logo

Microsoft Forefront UAG 2010 Administrator's Handbook by Ran Dolev, Erez Ben-Ari

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6. Authenticating and Controlling Access

So far in this book we have discussed several methods of using UAG in order to publish backend applications to end-users on the Internet, or to give these users full network access to a corporate LAN. However there is little chance that in real life, you would allow "free passage" to anyone out there, on the world wide web, to your organization resources. You also wouldn't allow just about anyone to walk into your corporate offices without requiring them to present some credentials before they can get into the elevator, not to mention into your data centre. There is also at least one, if not several, layers of authentication, both at the virtual gate to your corporate network (which is represented ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required