Token Server User Databases; About Token Servers And Cisco Secure Acs - Cisco 2509 - Router - EN User Manual

User guide
Hide thumbs Also See for 2509 - Router - EN:
Table of Contents

Advertisement

Chapter 11
Working with User Databases
Step 8

Token Server User Databases

About Token Servers and Cisco Secure ACS

78-14696-01, Version 3.1
Retries—The number of authentication attempts Cisco Secure ACS makes
before failing over to the secondary proxy RADIUS server.
Failback Retry Delay (minutes)—The number of minutes after which
Cisco Secure ACS attempts authentications using a failed primary proxy
RADIUS server.
Note
If both the primary and the secondary servers fail, Cisco Secure ACS
alternates between both servers until one responds.
Click Submit.
Result: Cisco Secure ACS saves the proxy RADIUS token server database
configuration you created. You can add it to your Unknown User Policy or assign
specific user accounts to use this database for authentication. For more
information about the Unknown User Policy, see
page
12-1. For more information about configuring user accounts to authenticate
using this database, see
Cisco Secure ACS supports the use of token servers for the increased security
provided by one-time passwords (OTPs). This section includes the following
topics:
About Token Servers and Cisco Secure ACS, page 11-57
RADIUS-Enabled Token Servers, page 11-59
RSA SecurID Token Servers, page 11-64
Cisco Secure ACS provides ASCII, PAP, and PEAP(EAP-GTC) authentication
using token servers. Other authentication protocols are not supported with token
server databases.
Chapter 7, "Setting Up and Managing User Accounts."
User Guide for Cisco Secure ACS for Windows Server
Token Server User Databases
Unknown User Processing,
11-57

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Secure acs

Table of Contents