06.05.2013 Views

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 12 <strong>User</strong> Databases<br />

OL-14386-02<br />

o=corporation.com<br />

or<br />

dc=corporation,dc=com<br />

<strong>User</strong> <strong>Guide</strong> <strong>for</strong> <strong>Cisco</strong> <strong>Secure</strong> <strong>Access</strong> <strong>Control</strong> <strong>Server</strong> 4.2<br />

Generic LDAP<br />

as applicable to your LDAP configuration. For more in<strong>for</strong>mation, refer to your LDAP database<br />

documentation.<br />

– <strong>User</strong>ObjectType—The name of the attribute in the user record that contains the username. You<br />

can obtain this attribute name from your Directory <strong>Server</strong>. For more in<strong>for</strong>mation, refer to your<br />

LDAP database documentation. ACS contains default values that reflect the default<br />

configuration of a Netscape Directory <strong>Server</strong>. Confirm all values <strong>for</strong> these fields with your<br />

LDAP server configuration and documentation.<br />

– <strong>User</strong>ObjectClass—The value of the LDAP objectType attribute that identifies the record as a<br />

user. Often, user records have several values <strong>for</strong> the objectType attribute, some of which are<br />

unique to the user, some of which are shared with other object types. This box should contain a<br />

value that is not shared.<br />

– GroupObjectType—The name of the attribute in the group record that contains the group<br />

name.<br />

– GroupObjectClass—A value of the LDAP objectType attribute in the group record that<br />

identifies the record as a group.<br />

– Group Attribute Name—The name of the attribute of the group record that contains the list of<br />

user records that are a member of that group.<br />

– <strong>Server</strong> Timeout—The number of seconds that ACS waits <strong>for</strong> a response from an LDAP server<br />

be<strong>for</strong>e determining that the connection with that server has failed.<br />

– On Timeout Use Secondary—Determines whether ACS per<strong>for</strong>ms failover of LDAP<br />

authentication attempts. For more in<strong>for</strong>mation about the LDAP failover feature, see LDAP<br />

Failover, page 12-25.<br />

– Failback Retry Delay—The number of minutes after the primary LDAP server fails to<br />

authenticate a user that ACS resumes sending authentication requests to the primary LDAP<br />

server first. A value of zero (0) causes ACS to always use the primary LDAP server first.<br />

– Max. Admin Connections—The maximum number of concurrent connections (greater than<br />

zero (0)) with LDAP administrator account permissions that can run <strong>for</strong> a specific LDAP<br />

configuration. These connections are used to search the Directory <strong>for</strong> users and groups under<br />

the <strong>User</strong> Directory Subtree and Group Directory Subtree.<br />

Primary and Secondary LDAP <strong>Server</strong>s—You can use the Primary LDAP <strong>Server</strong> table and the<br />

Secondary LDAP <strong>Server</strong> table to identify the LDAP servers and make settings that are unique to<br />

each. You do not need to complete the Secondary LDAP <strong>Server</strong> table if you do not intend to use<br />

LDAP failover.<br />

These tables contain:<br />

– Hostname—The name or IP address of the server that is running the LDAP software. If you are<br />

using DNS on your network, you can type the hostname instead of the IP address.<br />

– Port—The TCP/IP port number on which the LDAP server is listening. The default is 389, as<br />

stated in the LDAP specification. If you do not know the port number, you can find this<br />

in<strong>for</strong>mation by viewing those properties on the LDAP server. If you want to use secure<br />

authentication, port 636 is usually used.<br />

12-29

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!