Google Search Appliance: Managing Search for Controlled-Access Content Index 83
Crawl and Index > Forms Authentication page 10,
11, 13, 57, 58, 59, 79, 80
crawler access 8, 54, 57
credential groups
client certificate-based authentication 24–25
configuring 20
connectors 33
cookie-based authentication 20–23
creating 19–20
default 19
description 16
group is optional option 20
HTTP-based authentication 23–24
Kerberos-based authentication 25–30
LDAP 33–36
name 61
require a user-name option 19
SAML 32
satisfaction 18
D
default credential group 19
deny decision, authorization 39
DENY, flexible authorization 39
DES encryption 28
des3-cbc-sha1 encryption 25
des-cbc-md5 encryption 26
E
encryption methods 25
exact-match URL rules 43, 44
F
feeds
web 54
with per-URL ACLs 42
file shares, SMB or CIFS 6
flexible authorization
allow decision 39
deny decision 39
indeterminate 39
rules 39
supported authorization mechanisms 39
using 39
follow and crawl URLs 54, 58
force secure connections when serving 37
forms authentication
cookie authentication 72
crawl method 6, 7
use case 57–59
G
group is optional option 20
group lookup 36
H
HEADREQUEST, flexible authorization 39
HTTP
artifact binding 32
header, cookie cracking 37, 71
POST binding 32
HTTP Basic
crawl configuration 79
crawl method 6, 7
HTTP-based authentication
description 23–24
serve method 6
use case 53–56
HTTPS
crawl 55
enable crawl and serve 12
serve 11
serve with HTTP Basic and NTLM HTTP 36
I
Identity Provider
description 31
public key 32
indeterminate decision 39
index
excluding content 49
secure content 9
Integrated Windows Authentication 6
Internet Explorer, configuring for Kerberos
authentication 30
K
Kerberos-based authentication
access method 6
configuring a search appliance 26
configuring Internet Explorer 30
configuring web browsers 30
cross-domain access 26
DES encryption 28
description 25–31
KDC 27
keytab file 27, 64
rc4 encryption 27
seach by authorized users 64
seach by unauthorized users 66
serve method 6
silent authentication 37
SMB 26
supported authorization mechanisms 27
supported encryption methods 25
use case 63–66
Windows content sources 26
Key Distribution Center (KDC) 27, 64
L
late binding 47
LDAP
enabling on a search appliance 35
integrating with a search appliance 34
Komentarze do niniejszej Instrukcji