06.05.2013 Views

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Windows <strong>User</strong> Database<br />

12-20<br />

<strong>User</strong> <strong>Guide</strong> <strong>for</strong> <strong>Cisco</strong> <strong>Secure</strong> <strong>Access</strong> <strong>Control</strong> <strong>Server</strong> 4.2<br />

Chapter 12 <strong>User</strong> Databases<br />

– Enable EAP-TLS machine authentication—This check box controls whether ACS per<strong>for</strong>ms<br />

machine authentication by using a machine name and password with EAP-TLS. For more<br />

in<strong>for</strong>mation about machine authentication, see Machine Authentication, page 12-10.<br />

– Enable machine access restrictions— This box determines whether ACS uses machine<br />

authentication as a condition <strong>for</strong> user authorization. The following protocols are supported <strong>for</strong><br />

machine authentication: Microsoft PEAP EAP-TLS, EAP-FAST v1a, <strong>Cisco</strong> PEAP-TLS. If one<br />

of these protocols is used <strong>for</strong> machine authentication, the settings <strong>for</strong> MAR do not effect the<br />

user authentication. If a user tries to access the network with a computer that failed machine<br />

authentication, or with another protocol that does not support machine authentication,<br />

authorizations are implemented according to the machine access restriction configuration. For<br />

more in<strong>for</strong>mation about the MAR feature, see Machine <strong>Access</strong> Restrictions, page 12-12.<br />

Note <strong>User</strong>s that are authenticated through dial-up will always be treated according to the MAR<br />

configuration, since there is no machine authentication when using dial up. A user will be<br />

mapped to a specific group, as defined in the External <strong>User</strong> Databases > Database Group<br />

Mappings > Windows Database settings, when machine authentication occurs. If group<br />

mapping is not configured, the user will be mapped to the default group.<br />

Tip To enable machine access restrictions, you must specify a number greater than zero (0) in the<br />

Aging time (hours) box.<br />

– Aging time (hours)—This box specifies the number of hours that ACS caches IETF RADIUS<br />

Calling-Station-Id attribute values from successful machine authentications, <strong>for</strong> use with the<br />

MAR feature. The default value is 12 hours, which means that ACS does not cache<br />

Calling-Station-Id values.<br />

Note If you do not change the value of the Aging time (hours) box to something other than<br />

zero (0), all EAP-TLS and Microsoft PEAP users whose computers per<strong>for</strong>m machine<br />

authentication are assigned to the group that is specified in the Group map <strong>for</strong><br />

successful user authentication without machine authentication list.<br />

Tip To clear the cache of Calling-Station-Id values, type zero (0) in the Aging time (hours) box and click<br />

Submit.<br />

– Group map <strong>for</strong> successful user authentication without machine authentication—This list<br />

specifies the group profile that ACS applies to a user who accesses the network from a computer<br />

that has not passed machine authentication <strong>for</strong> longer than the number of hours specified in the<br />

Aging time (hours) box. To deny such users any access to the network, select <br />

(which is the default setting).<br />

Note <strong>User</strong> profile settings always override group profile settings. If a user profile grants an<br />

authorization that is denied by the group that is specified in the Group map <strong>for</strong><br />

successful user authentication without machine authentication list, ACS grants the<br />

authorization.<br />

OL-14386-02

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!