In DualShield, a logon procedure defines how users should be authenticated when they attempt to logon to an application. As DualShield supports various types of applications, e.g, VPN, SAML, Desktop Login, Outlook Email etc, there are various types logon procedure.

ApplicationLogin Procedure ExamplesComment
VPN

RADIUS

Cisco, Palo Alto, Juniper

Web/Cloud SAML Supporting Services

Web SSO

Office 365, G Suite, Service Now


IIS Web ApplicationsWeb SSOOWA, RDWeb
Computer LogonWindowsWindows logon, MacOS logon
Desktop to Web SSODesktop SSOOffice 365
Exchange On-PremisesExchange MailOutlook Anywhere, ActiveSync
Exchange OnlineEnhanced ClientActiveSyncObsolete
VMware View VMware View Agent
Obsolete
Parallels Remote Access Server2X Agent

LDAP Supporing ApplicationsLDAP Agent

DualShield Provisioning Server (DPS)Provisioning Server
Obsolete
DualShield Reset Password (DRP) ServiceReset Password

DualShield Unlock Account (DUA) ServiceUnlock Account

DualShield Emegency Access (DEA) ServiceEmegency Access

Deepnet AuthenticatorDeepnet Authenticator 


A logon procedure consists of one or more logon steps. In each logon step, the system administrator defines the authenticators that can be used by users to authenticate themselves.