Skip to main content
Home

Search form

Menu

Search form

  • SkyVault 2.0 overview
  • Video tutorials
  • Using SkyVault 2.0
  • System path conventions
  • Setting up authentication and security
    • SkyVault security
    • Managing SkyVault keystores
    • Cryptographic password hashing
    • Encrypting properties
    • Authentication subsystems
    • SkyVault authentication chain
    • Other pass-through properties
    • Domain mappings
    • Example: customizing the pass-through subsystem
      • Applying the Pass-through example
  • Managing authentication directories
  • Authorities
  • Defining permissions
  • Access Control Lists
  • Modifying access control
  • Public services
  • Implementation and services
  • Admin password in default authentication
  • Security policies and filters
  • Content modeling with Model Manager
  • Copyright
  • You are here

    SkyVault 2.0 » Configuring » Setting up authentication and security » Configuring authentication subsystems » Configuring pass-through » Example: customizing the pass-through subsystem

    Applying the Pass-through example

    Restart the SkyVault server.

    The main differences to notice are:

    • All Active Directory users can point their browser to the SkyVault server and be signed on automatically. (In Internet Explorer, this requires adding the SkyVault server to the Local Intranet security zone.)
    • All Active Directory users can access SkyVault as a CIFS file system using their Active Directory credentials.
    Parent topic: Example: customizing the pass-through subsystem

    © 2017 TBS-LLC. All Rights Reserved.    Follow @twitter