06.05.2013 Views

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 12 <strong>User</strong> Databases<br />

About External <strong>User</strong> Databases<br />

OL-14386-02<br />

About External <strong>User</strong> Databases<br />

You can configure ACS to <strong>for</strong>ward authentication of users to one or more external user databases.<br />

Support <strong>for</strong> external user databases means that ACS does not require that you create duplicate user<br />

entries in the user database. In organizations in which a substantial user database already exists, ACS<br />

can leverage the work already invested in building the database without any additional input.<br />

In addition to per<strong>for</strong>ming authentication <strong>for</strong> network access, ACS can per<strong>for</strong>m authentication <strong>for</strong><br />

TACACS+ enabling privileges by using external user databases. For more in<strong>for</strong>mation about TACACS+<br />

enable passwords, see Setting TACACS+ Enable Password Options <strong>for</strong> a <strong>User</strong>, page 6-23.<br />

Note You can only use external user databases to authenticate users and to determine the group to which ACS<br />

assigns a user. The ACS internal database provides all authorization services. With few exceptions, ACS<br />

cannot retrieve authorization data from external user databases. Exceptions are noted where applicable<br />

in the discussions of specific databases in this chapter. For more in<strong>for</strong>mation about group mapping <strong>for</strong><br />

unknown users, see Chapter 16, “<strong>User</strong> Group Mapping and Specification.”<br />

<strong>User</strong>s can be authenticated when using the following databases:<br />

Windows <strong>User</strong> Database<br />

Generic LDAP Open Database Connectivity (ODBC)-compliant relational databases (ACS <strong>for</strong><br />

Windows)<br />

LEAP Proxy Remote Authentication Dial-In <strong>User</strong> Service (RADIUS) servers<br />

RADIUS Token server<br />

RSA SecurID Token <strong>Server</strong><br />

RSA Authentication with LDAP Group Mapping<br />

For ACS to interact with an external user database, ACS requires an API <strong>for</strong> the third-party<br />

authentication source. Then ACS communicates with the external user database by using the API.<br />

ACS <strong>for</strong> Windows<br />

For RSA token servers, you can install the software components that RSA provides or you can use the<br />

RADIUS interface. For token servers by other vendors, the standard RADIUS interface serves as the<br />

third-party API.<br />

For Open Database Connectivity (ODBC) authentication sources, in addition to the Windows ODBC<br />

interface, you must install the third-party ODBC driver on the ACS Windows server.<br />

ACS SE<br />

For RSA token servers, you must use the RADIUS interface.<br />

For Windows user databases, you must install and configure the ACS Remote Agent <strong>for</strong> Windows. The<br />

Remote Agent interacts with the Windows operating system to provide authentication. See the<br />

Installation and Configuration <strong>Guide</strong> <strong>for</strong> <strong>Cisco</strong> <strong>Secure</strong> ACS Remote Agents Release 4.2.<br />

<strong>User</strong> <strong>Guide</strong> <strong>for</strong> <strong>Cisco</strong> <strong>Secure</strong> <strong>Access</strong> <strong>Control</strong> <strong>Server</strong> 4.2<br />

12-3

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!