Authentication Integration method

Authentication Integration can be done using Genian NAC interworking, Syslog authentication replacement, Active Directory and user information interworking of external systems.

Authentication Integration using Genian NAC

If you are operating Genian NAC and are using the Authentication Integration Policy, you can use NAC's authentication information for Insights Endpoints authentication.

How to handle authentication

  1. To use NAC authentication information, agent deployment method must be set to NAC plugin or Standalone + NAC link mode in Insights Web Console Settings.
  2. After authentication integration in the NAC agent, when GsAgent is activated, the authentication information value recorded in the registry is checked and the authentication information is transmitted to the Genian Insights E server together.
  3. Authenticated user information can be checked in the AuthName and Department Name columns of Analysis > Endpoints > Management after logging into the Insights Web Console.

Authentication Integration using external system interworking

If there is an external system with user ID, department information, IP, and MAC information, information from the external system can be imported to Genian Insights E server and used for Endpoints authentication.

User Data Synchronization

  1. First, go through the synchronization settings that bring the user ID and department information of the external system to the Genian Insights E server. Go to the System > Settings > Employees > Data Synchronization menu, and click the ‘Add’ button at the top left.
  2. Set the synchronization execution cycle and execution options in the Basic Settings item.
  3. Find DB type menu in Detailed Settings. Select the database type from which data is to be read and input external system information.
  4. Find user information, department information, and job position information in Detailed Settings and add the necessary information. (If using CSV, leave it blank). Enter the authentication processing IP or authentication processing MAC column information as well.
  5. After checking the entered information, click the 'Save' button in the upper left corner.
  6. Select the item you want to synchronize from the Data Synchronization list and click ‘Auth Sync Immediate Action’. "Are you sure you want to request Auth Sync Immediate Action for the selected item?" A pop-up window will appear, click ‘OK’. After that, data synchronization is performed according to the synchronization execution cycle set in step 2.
  7. After synchronization is complete, you can check the audit log like "Data Synchronization Completed.ID=XXXXX", "User Synchronization Completed. ID=XXXXXX" in Discovery > Insights Logs.

Syslog authentication replacement

  1. Perform user data synchronization first.
  2. Go to the System > Settings > Employees > Authentication Integration menu and change Syslog Authentication Alternate Settings to On.
  3. After setting the Prefix, Endpoints search method, and whether to disable Release authentication, click the ‘Save’ button in the upper left corner.
  4. When data is received in the format set in 3 through Syslog, the Genian Insights E server performs authentication processing for Endpoints.
  5. Authenticated user information can be checked in the AuthName and Department Name columns of Analysis > Endpoints > Management.

Active Directory Authentication

  1. Perform user data synchronization first.
  2. Go to the System > Settings > Employees > Authentication Integration menu and change Active Directory Settings to On.
  3. Enter the domain information to be authenticated. If the domains match, authentication is processed. If there are multiple domains, enter them separated by commas and click the 'Save' button at the top left.
  4. If user data synchronization is processed after Endpoints authentication, click the ‘User Information Update’ button to perform authentication processing again on the server.
  5. Authenticated user information can be checked in the AuthName and Department Name columns of Analysis > Endpoints > Management.