IT tutorials
 
Technology
 

Windows Small Business Server 2011 : Remote Web Access (part 4) - Enabling or Disabling a User for RWA

11/22/2013 2:14:48 AM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

2. Enabling or Disabling a User for RWA

You can enable or disable the access of individual users to RWA. Normally, all users are enabled for RWA, but if you want only a subset of your users to have the privilege to log in to RWA you can disable the access of those you want to exclude.

Follow these steps to enable or disable a user from Remote Web Workplace:

  1. Open the Windows SBS Console if it isn’t already open.

  2. Click on Users And Groups in the navigation bar and then click on the Groups tab.

  3. Select the Windows SBS Remote Web Access Users security group in the main pane, and click Edit Group Properties in the Tasks pane to open the Properties dialog box for the group, as shown in Figure 12.

    Figure 12. The Properties page of the Windows SBS Remote Web Access Users security group

  4. Select a user account in the Group Members pane, and click Remove to remove the user.

  5. To add a user account, click Add to open the Change Group Membership dialog box shown in Figure 13.

    Figure 13. The Change Group Membership dialog box

  6. Select one or more users or groups in the left pane, and click Add to add them to the group. To remove users from the group, select them in the right pane and click Remove.

  7. Click OK and then OK again to exit the dialog box and return to the Windows SBS Console.


Note:

If your environment includes multiple users who should not have permission to use Remote Web Access, consider creating a User Role for them that excludes membership in the Windows SBS Remote Web Access Users security group. This is a better way to manage the rights and privileges of multiple users in a consistent way.


Two Factor Authentication and RWA

Remote Web Access is a secure way to connect to your SBS network. It uses IPSec tunneling, and it uses the authentication of Microsoft’s Active Directory (your user name and password) to grant access to the resources of your SBS network. That being said, if your SBS network contains sensitive information and you’re subject to regulatory requirements for data protection, you should consider Two Factor Authentication (TFA) on RWA, especially for any accounts that are either Network Administrators or have special access to sensitive data.

Authentication is the process of ensuring that the individual who requests access to a resource is, in fact, the individual she is claiming to be. There are four basic kinds of authentication: “what-you-know,” “who-you-are,” “what-you-have,” and “where-you-are.” TFA requires that any user requesting remote access to the resources of your SBS network use two methods to uniquely identify herself. The first method is the providing the user name and password of the user, and the second is some other factor. The real beauty of TFA is that even if one of your factors is compromised, it’s useless without the second factor.

The basic user name and password is a what-you-know factor, and it’s the most commonly used form of authentication. When combined with a sort of loose where-you-are factor—that is, at the console of your own PC—and when passwords or passphrases are sufficiently complex, it’s a good method of authentication.

Who-you-are authentication is usually some form of biometric analysis—fingerprint readers, retina scanners, and even visual recognition software all are forms of who-you-are authentication. We’re not big fans of the most common of these, fingerprint readers. They’re rather easily defeated from what we’ve seen to date.

What-you-have authentication is usually something like a smart card or a one-time password generator. Microsoft’s corporate network uses smart cards for its TFA, but we think one-time passwords are a lot easier to deal with and deploy in a small business. You don’t require deploying smart card readers for everyone, and the overall costs are significantly less as a result.

Finally, where-you-are authentication uses your physical location as a proof of who you are. An example is the variable authentication process that some banks are implementing. It starts with the IP address and machine name from which you’re connecting to your bank. The bank knows that the IP address is typical for you and only asks a standard set of verification questions. But if you were to connect from a public wireless access point while you’re on vacation, the bank would immediately be more cautious about who you are claiming to be, and the secondary verification process is more detailed. This kind of variable authentication process is expensive to implement and outside the scope of most small businesses.

We use TFA for remote access to our SBS network. We’ve implemented Scorpion Software’s AuthAnvil (http://www.scorpionsoft.com). The AuthAnvil RWA agent (formerly known as RWWGuard) extends the standard RWA logon page to require a one-time password, as shown in Figure 14.

Figure 14. RWA logon page running the AuthAnvil agent


What we really like about AuthAnvil is that it’s almost completely transparent. It looks and feels just like SBS, except for the one additional field for our one-time password. And with the AuthAnvil Soft Token running on our phone, we no longer even have to carry around an AuthAnvil key fob passcode generator.
 
Others
 
- Windows Small Business Server 2011 : Remote Web Access (part 3) - Configuring the RWA Computer List - Enabling RWA Access to a Terminal Server
- Windows Small Business Server 2011 : Remote Web Access (part 2) - Configuring the RWA Computer List
- Windows Small Business Server 2011 : Remote Web Access (part 1)
- Windows 8 : Mobile Computing - Managing Power Consumption (part 2) - To change the power plan on a PC
- Windows 8 : Mobile Computing - Managing Power Consumption (part 1) - To change the power plan on a battery-powered device
- Windows 8 : Mobile Computing - Data Synchronization - Smart Network Switching
- Windows 8 : Mobile Computing - Data Synchronization - To set up data synchronization
- Windows 8 : Mobile Computing - Windows Mobility Center
- Windows 8 : Mobile Computing - Windows Phone 8 Features
- Sharepoint 2013 : Using BCS (part 10) - Using Visual Studio 2012 with BCS
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us