Rsa Securid Token Servers - Cisco 2509 - Router - EN User Manual

User guide
Hide thumbs Also See for 2509 - Router - EN:
Table of Contents

Advertisement

Token Server User Databases
Step 9

RSA SecurID Token Servers

Note
User Guide for Cisco Secure ACS for Windows Server
11-64
You should only use the From Token Server (async tokens only)
Note
option if all tokens submitted to this token server are asynchronous
tokens.
Click Submit.
Result: Cisco Secure ACS saves the RADIUS token server database configuration
you created. You can add it to your Unknown User Policy or assign specific user
accounts to use this database for authentication. For more information about the
Unknown User Policy, see
information about configuring user accounts to authenticate using this database,
see
Chapter 7, "Setting Up and Managing User Accounts."
Cisco Secure ACS supports ASCII, PAP, and PEAP(EAP-GTC) authentication
for RSA SecurID token servers. Other authentication protocols are not supported
with RSA SecurID external user databases.
Authentication protocols not supported with RSA SecurID databases may be
supported by another type of external user database. For more information about
authentication protocols and the external database types that support them, see
Authentication Protocol-Database Compatibility, page
Cisco Secure ACS supports mapping users authenticated by a RSA token server
to a single group. For more information, see
Database, page
12-12.
Cisco Secure ACS supports PPP (ISDN and async) and Telnet for RSA SecurID
token servers. It does so by acting as a token-card client to the RSA SecurID token
server. This requires that RSA token-card client software must be installed on the
Cisco Secure ACS Windows 2000 server. The following procedure includes steps
required to install the RSA client correctly on the Cisco Secure ACS Windows
2000 server.
Chapter 11
Unknown User Processing, page
Group Mapping by External User
Working with User Databases
12-1. For more
1-9.
78-14696-01, Version 3.1

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Secure acs

Table of Contents