06.05.2013 Views

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ACS Internal Database<br />

About the ACS Internal Database<br />

<strong>User</strong> Import and Creation<br />

12-2<br />

<strong>User</strong> <strong>Guide</strong> <strong>for</strong> <strong>Cisco</strong> <strong>Secure</strong> <strong>Access</strong> <strong>Control</strong> <strong>Server</strong> 4.2<br />

Chapter 12 <strong>User</strong> Databases<br />

For users who are authenticated by using the ACS internal database, ACS stores user passwords in a<br />

database which is protected by an administration password and encrypted by using the AES 128<br />

algorithm. For users who are authenticated with external user databases, ACS does not store passwords<br />

in the ACS internal database.<br />

Unless you have configured ACS to authenticate users with an external user database, ACS uses<br />

usernames and passwords in the ACS internal database during authentication. For more in<strong>for</strong>mation<br />

about specifying an external user database <strong>for</strong> authentication of a user, see Adding a Basic <strong>User</strong> Account,<br />

page 6-3.<br />

The following facilities can import or create user accounts:<br />

RDBMS Synchronization—You can use RDBMS Synchronization to create large numbers of user<br />

accounts and configure many settings <strong>for</strong> user accounts. RDBMS also supports import of user<br />

accounts from external sources. We recommend that you use this feature whenever you need to<br />

import users by bulk; however, setting up RDBMS Synchronization <strong>for</strong> the first time requires several<br />

important decisions and time to implement them. For more in<strong>for</strong>mation, see RDBMS<br />

Synchronization, page 8-17.<br />

CSUtil.exe (ACS <strong>for</strong> Windows)—The CSUtil.exe command-line utility provides a simple means of<br />

creating basic user accounts. CSUtil.exe also supports import of user accounts from external<br />

sources. When compared to RDBMS Synchronization, its functionality is limited; however, it is<br />

simple to prepare <strong>for</strong> importing basic user accounts and assigning users to groups. For more<br />

in<strong>for</strong>mation, see Appendix C, “CSUtil Database Utility.”<br />

The following facilities can create user accounts:<br />

ACS web interface—The web interface provides the ability to create user accounts manually, one<br />

user at a time. Regardless of how a user account was created, you can edit a user account by using<br />

the web interface. For detailed steps, see Adding a Basic <strong>User</strong> Account, page 6-3.<br />

Unknown <strong>User</strong> Policy—The Unknown <strong>User</strong> Policy enables ACS to add users automatically when<br />

it finds a user without an account in an external user database. The creation of a user account in ACS<br />

occurs only when the user attempts to access the network and is successfully authenticated by an<br />

external user database. For more in<strong>for</strong>mation, see Chapter 15, “Unknown <strong>User</strong> Policy.”<br />

If you use the Unknown <strong>User</strong> Policy, you can also configure group mappings so that each time a user<br />

who was added to ACS by the Unknown <strong>User</strong> Policy is authenticated, the user group assignment is<br />

made dynamically. For some external user database types, user group assignment is based on group<br />

membership in the external user database. For other database types, all users who were authenticated<br />

by a given database are assigned to a single ACS user group. For more in<strong>for</strong>mation about group<br />

mapping, see Chapter 16, “<strong>User</strong> Group Mapping and Specification.”<br />

Database Replication—Database Replication creates user accounts on a secondary ACS by<br />

overwriting all existing user accounts on a secondary ACS with the user accounts from the primary<br />

ACS. Any user accounts that are unique to a secondary ACS are lost in the replication. For more<br />

in<strong>for</strong>mation, see ACS Internal Database Replication, page 8-1.<br />

OL-14386-02

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!