Athena SWG (Secure Web Gateway)

Athena SWG (formerly Internet Access Gateway) ensures visibility and control across the network, detecting risks like unauthorized access, non-compliant activities, and data leaks to manage endpoints.
{{ $t('productDocDetail.guideClickSwitch') }}
{{ $t('productDocDetail.know') }}
{{ $t('productDocDetail.dontRemind') }}
13.0.120
{{sendMatomoQuery("Athena SWG (Secure Web Gateway)","H3C CAMS")}}

H3C CAMS

{{ $t('productDocDetail.updateTime') }}: 2025-12-29

H3C CAMS is similar to Ruijie SAM, a broadband authentication and charging management system commonly used by colleges and level-2 carriers. The IAG works with H3C CAMS using an interface provided by H3C CAMS and regularly obtains user information from H3C CAMS to update its online user line or user list for SSO. See the following figure.

The data flow is as follows:

  1. A PC is authenticated by H3C CAMS.
  1. The IAG synchronizes information about the organization structure and online users from H3C CAMS as scheduled.
  2. The PC accesses the Internet as an online user whose information is obtained by the IAG.

The procedure is as follows:

Step 1.Set the authentication policy. Navigate to  Access Mgt > Authentication > Web Authentication > Authentication Policy and click Add to set the authentication policy according to the IP or MAC addresses of the users who require SSO.

Step 2.Choose Access Mgt > Authentication > Web Authentication > Single Sign On SSO > Third-Party Server and set the H3C CAMS server.

Step 3.Choose Users > Single Sign On SSO > Third-Party Server and perform configuration.

Select H3C CAMS System and select the H3C CAMS server configured on the External Authentication Server page.

Step 4.When H3C CAMS authenticates a user, the user can access the Internet through the IAG.

1. H3C CAMS allows automatic user information synchronization at Access Mgt > User Management > User Sync.

2. In some cases, a user is authenticated by the IAG (depending on Interval for Obtaining Authenticated User) after being authenticated by the authentication server. Therefore, it is recommended that the authentication policy be configured not to require user authentication after an SSO failure.