SAML for Single Sign-On (SSO)
Deep Discovery Web
Inspector supports the Security Assertion Markup Language
(SAML) authentication standard. SAML uses Okta and Active Directory Federation Services
(ADFS) identify providers to allow users to single sign-on to the Deep Discovery Web
Inspector console when they sign in to their
organization's portal.
Customizable NICs for Management, Authentication, Proxy, and Dirty Line
Deep Discovery Web
Inspector is now able to choose different NIC as the
authentication service interface, dirty line interface, or proxy service interface
when
deploying in forward proxy mode.
-
By default, eth0 should be the management service interface, authentication service interface, dirty line interface, and proxy service interface in the forward deployment mode.
-
The administrator can choose eth1 as the dirty line interface.
-
The administrator can choose eth4 as the proxy/authentication service interface.
The system should be able to choose different NIC as the authentication service
interface or dirty line interface when deploying Deep Discovery Web
Inspector in the transparent mode, transparent HA mode, multiple bridge mode and bridge LACP
mode.
-
By default, eth0 should be the management service interface, authentication service interface and dirty line interface; eth4 should be the bridge ingress port; eth5 should be the bridge egress port.
-
The administrator can choose eth1 as the dirty line interface.
-
The administrator can choose eth2 as the authentication service interface.
Support for Dynamic URL Scanning
Deep Discovery Web
Inspector supports dynamic URL scanning and analysis for
detecting 0-day phishing. When Global Dynamic URL Scanning Setting is enabled, Deep Discovery Web
Inspector will detect the web phishing in real time to
prevent users from leaking critical personal information. By default, the Global Dynamic
URL
Scanning Setting is disabled.