Configuring authentication methods for ISA

It is important to have some sort of authentication method when using clients to access a resource through ISA, not doing so could result in unauthorized access to resources in or outside of your network. ISA has various methods of authenticating clients, I have discussed this in a previous tutorial (Understanding ISA’s different Authentication types). I will tutor you on how to configure various authentication types best suited for your ISA server. While showing you in five easy steps, how to configure the various authentication types, I will not go into too much detail on each authentication type. For more comprehensive on authentication types information please refer to my previous tutorial (Understanding ISA’s different Authentication types).


Right click your ISA server and then click properties.


You will be presented with this window, please click on Outgoing Web Requests Please note: Configuration of Incoming Web Requests is the same as identical to the one we have just selected.


Select your server in the identification box and then please click Edit.



Summary: I have shown you how to configure the different authentication types found in ISA, it helps to understand what the limitations of each authentication type is, and how it will impact on your business. It’s important to note that if you do not check the check box that requires authentication from the clients then anonymous access is allowed, if there are no blocking rules or policies. These authentication methods were tested using Internet explorer 5.5 and above. Please note that it has been reported that other web browsers do not support some of the authentication methods shown above.

About The Author

Leave a Comment

Your email address will not be published. Required fields are marked *

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scroll to Top