27.11.2012 Views

IronPort - daily management guide - AsyncOS 7.6.1

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Working with User Accounts<br />

Enabling LDAP Authentication<br />

8-24<br />

Figure 8-16 Enabling External Authentication<br />

Cisco <strong>IronPort</strong> <strong>AsyncOS</strong> 7.6 for Email Daily Management Guide<br />

Chapter 8 Common Administrative Tasks<br />

In addition to using an LDAP directory to authenticate users, you can assign LDAP groups to Cisco<br />

<strong>IronPort</strong> user roles. For example, you can assign users in the IT group to the Administrator user role, and<br />

you can assign users in the Support group to the Help Desk User role. If a user belongs to multiple LDAP<br />

groups with different user roles, <strong>AsyncOS</strong> grants the user the permissions for the most restrictive role.<br />

For example, if a user belongs to a group with Operator permissions and a group with Help Desk User<br />

permissions, <strong>AsyncOS</strong> grants the user the permissions for the Help Desk User role.<br />

Note If an external user changes the user role for their LDAP group, the user should log out of the appliance<br />

and then log back in. The user will have the permissions of their new role.<br />

Before enabling external authentication using LDAP, define an LDAP server profile and an external<br />

authentication query for the LDAP server. For more information, see the “LDAP Queries” chapter in the<br />

Cisco <strong>IronPort</strong> <strong>AsyncOS</strong> for Email Advanced Configuration Guide.<br />

To enable external authentication using LDAP:<br />

Step 1 On the System Administration > Users page, click Enable. The Edit External Authentication page is<br />

displayed.<br />

Step 2 Select the Enable External Authentication check box.<br />

Step 3 Select LDAP for the authentication type.<br />

Figure 8-17 Enabling External Authentication Using LDAP<br />

Step 4 Enter the amount of time to store external authentication credentials in the web user interface.<br />

Step 5 Select the LDAP external authentication query that authenticates users.<br />

Step 6 Enter the number of seconds that the appliance waits for a response from the server before timing out.<br />

Step 7 Enter the name of a group from the LDAP directory that you want the appliance to authenticate, and<br />

select the role for the users in the group.<br />

Step 8 Optionally, click Add Row to add another directory group. Repeat steps 7 and 8 for each directory group<br />

that the appliance authenticates.<br />

Step 9 Submit and commit your changes.<br />

OL-25138-01

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!