06.05.2013 Views

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 12 <strong>User</strong> Databases<br />

Generic LDAP<br />

OL-14386-02<br />

<strong>User</strong> <strong>Guide</strong> <strong>for</strong> <strong>Cisco</strong> <strong>Secure</strong> <strong>Access</strong> <strong>Control</strong> <strong>Server</strong> 4.2<br />

Generic LDAP<br />

<strong>User</strong> authentication between multiple <strong>for</strong>ests is supported <strong>for</strong> EAP-FASTv1a with PEAP, MSPEAP, and<br />

<strong>for</strong> EAP-TLS.<br />

Note The multi-<strong>for</strong>est feature works only when the username contains the domain in<strong>for</strong>mation.<br />

For in<strong>for</strong>mation about the types of authentication that ACS supports with generic LDAP databases, such<br />

as Netscape Directory Services, see Authentication Protocol-Database Compatibility, page 1-8.<br />

ACS supports group mapping <strong>for</strong> unknown users by requesting group membership in<strong>for</strong>mation from<br />

LDAP user databases. For more in<strong>for</strong>mation about group mapping <strong>for</strong> users who are authenticated with<br />

an LDAP user database, see Group Mapping by Group Set Membership, page 16-3.<br />

Configuring ACS to authenticate against an LDAP database has no effect on the configuration of the<br />

LDAP database. To manage your LDAP database, see your LDAP database documentation.<br />

This section contains:<br />

ACS Authentication Process with a Generic LDAP <strong>User</strong> Database, page 12-23<br />

Multiple LDAP Instances, page 12-24<br />

LDAP Organizational Units and Groups, page 12-24<br />

Domain Filtering, page 12-24<br />

LDAP Failover, page 12-25<br />

LDAP Admin Logon Connection Management, page 12-26<br />

Distinguished Name Caching, page 12-26<br />

LDAP Configuration Options, page 12-27<br />

Configuring a Generic LDAP External <strong>User</strong> Database, page 12-31<br />

Downloading a Certificate Database (Solution Engine Only), page 12-47<br />

ACS Authentication Process with a Generic LDAP <strong>User</strong> Database<br />

ACS <strong>for</strong>wards the username and password to an LDAP database by using a Transmission <strong>Control</strong><br />

Protocol (TCP) connection on a port that you specify. The LDAP database passes or fails the<br />

authentication request from ACS. When receiving the response from the LDAP database, ACS instructs<br />

the requesting AAA client to grant or deny the user access, depending on the response from the LDAP<br />

server.<br />

ACS grants authorization based on the ACS group to which the user is assigned. While the group to<br />

which a user is assigned can be determined by in<strong>for</strong>mation from the LDAP server, ACS grants<br />

authorization privileges.<br />

12-23

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!