
(are denied by URL rules) to unauthenticated users (refer to chapter15.2). Then, if the authentication is successful, it opens the solicited web page.ĭisabled, user authentication will be required only for Web pages which are not available

KERIO CONNECT ADMIN GUIDE WINDOWS
Using NTLM - if Internet Explorer or Firefox/SeaMonkey is used and the user is authenticated in a Windows NT domain or Active Directory, the user can beĪuthenticated automatically (the login page will not be displayed).Requested page or to the page including the information where the access was denied. After a successful login, the user is automatically re-directed to the If not, Kerio Control will re-direct the user to the login pageĪutomatically.

Kerio Control detects whether the user has already authenticated. Login by re-direction is performed in the following way: user enters URL pages that Redirection - when accessing any website (unless access to this page is explicitlyĪllowed to unauthenticated users - see chapter15.2).Multiple users (user’s identity might be misused easily). This authentication method is not recommended for cases where hosts are used by However, users may authenticate from other hosts That it is currently used by the particular user, and the user is considered beingĪuthenticated from the IP address. Whenever traffic coming from the particular host is detected, Kerio Control assumes Automatically - IP addresses of hosts from which they will be authenticatedĪutomatically can be associated with individual users.the user does not getĪuthenticated at the firewall by the login)! is not equal to user authentication at the firewall (i.e. It is also possible to authenticate for viewing of the web statistics (see chapter23) at (the server name used is for reference only - see chapter14). Manually - in the browser, by opening the Kerio Control with the URL.You can also use the Kerio APIs Client Library for PHP for easy integration into your scripts and applications.Any user with their own account in Kerio Control can authenticate at the firewall (regardless Connect over HTTPS, send a request in a well-known human-readable format (JSON) and receive a response in the same format. The API is designed to be accessible for any programming language.

You can use IMAP/CalDAV/CardDAV protocols instead. Other APIs to manage calendars or user data are not supported. Currently, only the Administration API for Kerio Connect is available. With the new Administration API for Kerio Connect, you can access your Kerio Connect server, integrate it with third-party solutions, or write simple scripts to handle advanced administration tasks. Our Web Administration for Kerio Connect uses the same API that is now available to you.
KERIO CONNECT ADMIN GUIDE FULL
For full JSON-RPC 2.0 specifications, click here.
KERIO CONNECT ADMIN GUIDE CODE
The Kerio API is built on solid foundations of JSON-RPC, whose advantages include easy-of-use code readability and wide support among different programming languages and publicly available libraries.
