Generic Ldap - Cisco 2509 - Router - EN User Manual

User guide
Hide thumbs Also See for 2509 - Router - EN:
Table of Contents

Advertisement

Generic LDAP

Step 8
Step 9
Generic LDAP
Note
User Guide for Cisco Secure ACS for Windows Server
11-16
In the MS-CHAP table, follow these steps:
To support for authentication, select the check boxes for the applicable
a.
MS-CHAP versions.
To enable password changes, select the check boxes for the applicable
b.
MS-CHAP versions.
Click Submit.
Result: Cisco Secure ACS saves the Windows NT/2000 user database
configuration you created. You can now add it to your Unknown User Policy or
assign specific user accounts to use this database for authentication. For more
information about the Unknown User Policy, see
page
12-1. For more information about configuring user accounts to authenticate
using this database, see
Cisco Secure ACS supports ASCII, PAP, EAP-TLS, and PEAP(EAP-GTC)
authentication via generic Lightweight Directory Access Protocol (LDAP)
databases, such as Netscape Directory Services. Other authentication protocols
are not supported with LDAP external user databases.
Authentication protocols not supported with LDAP databases may be supported
by another type of external user database. For more information about
authentication protocols and the external database types that support them, see
Authentication Protocol-Database Compatibility, page
Cisco Secure ACS supports group mapping for unknown users by requesting
group membership information from LDAP user databases. For more information
about group mapping for users authenticated with an LDAP user database, see
Group Mapping by Group Set Membership, page
Configuring Cisco Secure ACS to authenticate against an LDAP database has no
effect on the configuration of the LDAP database. To manage your LDAP
database, see your LDAP database documentation.
Chapter 11
Chapter 7, "Setting Up and Managing User Accounts."
Working with User Databases
Unknown User Processing,
1-9.
12-14.
78-14696-01, Version 3.1

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Secure acs

Table of Contents