06.05.2013 Views

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Generic LDAP<br />

Successful Previous Authentication with the Primary LDAP <strong>Server</strong><br />

12-26<br />

<strong>User</strong> <strong>Guide</strong> <strong>for</strong> <strong>Cisco</strong> <strong>Secure</strong> <strong>Access</strong> <strong>Control</strong> <strong>Server</strong> 4.2<br />

Chapter 12 <strong>User</strong> Databases<br />

If, on the previous LDAP authentication attempt, ACS successfully connected to the primary LDAP<br />

server, ACS attempts to connect to the primary LDAP server. If ACS cannot connect to the primary<br />

LDAP server, ACS attempts to connect to the secondary LDAP server.<br />

If ACS cannot connect with LDAP server, ACS stops attempting LDAP authentication <strong>for</strong> the user. If the<br />

user is an unknown user, ACS tries the next external user database in the Unknown <strong>User</strong> Policy list. For<br />

more in<strong>for</strong>mation about the Unknown <strong>User</strong> Policy list, see About Unknown <strong>User</strong> Authentication,<br />

page 15-3.<br />

Unsuccessful Previous Authentication with the Primary LDAP <strong>Server</strong><br />

If, on the previous LDAP authentication attempt, ACS could not connect to the primary LDAP server,<br />

whether ACS first attempts to connect to the primary server or secondary LDAP server <strong>for</strong> the current<br />

authentication attempt depends on the value in the Failback Retry Delay box. If the Failback Retry Delay<br />

box is set to zero (0), ACS always attempts to connect to the primary LDAP server first. And if ACS<br />

cannot connect to the primary LDAP server, ACS then attempts to connect to the secondary LDAP<br />

server.<br />

If the Failback Retry Delay box is set to a number other than zero (0), ACS determines how many<br />

minutes have passed since the last authentication attempt by using the primary LDAP server. If more<br />

minutes have passed than the value in the Failback Retry Delay box, ACS attempts to connect to the<br />

primary LDAP server first. And if ACS cannot connect to the primary LDAP server, ACS then attempts<br />

to connect to the secondary LDAP server.<br />

If fewer minutes have passed than the value in the Failback Retry Delay box, ACS attempts to connect<br />

to the secondary LDAP server first. And if ACS cannot connect to the secondary LDAP server, ACS then<br />

attempts to connect to the primary LDAP server.<br />

If ACS cannot connect to either LDAP server, ACS stops attempting LDAP authentication <strong>for</strong> the user.<br />

If the user is an unknown user, ACS tries the next external user database in the Unknown <strong>User</strong> Policy<br />

list. For more in<strong>for</strong>mation about the Unknown <strong>User</strong> Policy list, see About Unknown <strong>User</strong><br />

Authentication, page 15-3.<br />

LDAP Admin Logon Connection Management<br />

When ACS checks authentication and authorization of a user on an LDAP server, it uses a connection<br />

with the LDAP administrator account permissions. It uses the connection to search <strong>for</strong> the user and user<br />

groups on the Directory subtree. ACS retains the administrator connections that are open <strong>for</strong> successive<br />

use and additional administrator binds are not required <strong>for</strong> each authentication request. You can limit the<br />

maximum number of concurrent administrator connections per Generic LDAP External DB<br />

configuration (primary and secondary).<br />

Distinguished Name Caching<br />

Searching can be an expensive LDAP operation, which introduces an element of unpredictability into<br />

the authentication. ACS takes the username that the authentication process supplies, and asks the LDAP<br />

server to search a full subtree of unknown depth, over an unknown user population.<br />

After successful authentication ACS caches the Distinguished Name (DN) that the search returns.<br />

Reauthentications can then use the cached DN to per<strong>for</strong>m an immediate lookup of the user.<br />

OL-14386-02

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!