Cisco Acs 57 User Guide
Here you can view all the pages of manual Cisco Acs 57 User Guide. The Cisco manuals for Control System are available online for free. You can easily download all the documents as PDF.
Page 211
8 Managing Users and Identity Stores Managing External Identity Stores Related Topics RADIUS Identity Stores, page 75 Creating, Duplicating, and Editing RADIUS Identity Servers, page 78 Configuring Shell Prompts, page 81 Configuring Directory Attributes, page 82 Configuring Advanced Options, page 83 Configuring Shell Prompts For TACACS+ ASCII authentication, ACS must return the password prompt to the user. RADIUS identity server supports this functionality by the password prompt option. ACS can...
Page 212
8 Managing Users and Identity Stores Managing External Identity Stores Configuring Directory Attributes When a RADIUS identity server responds to a request, RADIUS attributes are returned along with the response. You can make use of these RADIUS attributes in policy rules. In the Directory Attributes tab, you can specify the RADIUS attributes that you use in policy rule conditions. ACS maintains a separate list of these attributes. 1.Modify the fields in the Directory Attributes tab as described in...
Page 213
8 Managing Users and Identity Stores Configuring CA Certificates Configuring Advanced Options, page 83 Configuring Advanced Options In the Advanced tab, you can do the following: Define what an access reject from a RADIUS identity server means to you. Enable identity caching. Enable passcode caching. Table 61 on page 83 describes the fields in the Advanced tab of the RADIUS Identity Servers page. Click Submit to save the RADIUS Identity Server. Related Topics RADIUS Identity Stores, page 75...
Page 214
8 Managing Users and Identity Stores Configuring CA Certificates You use the CA options to install digital certificates to support EAP-TLS authentication. ACS uses the X.509 v3 digital certificate standard. ACS also supports manual certificate acquisition and provides the means for managing a certificate trust list (CTL) and certificate revocation lists (CRLs). Digital certificates do not require the sharing of secrets or stored database credentials. They can be scaled and trusted over large...
Page 215
8 Managing Users and Identity Stores Configuring CA Certificates 4.Click Submit. The new certificate is saved. The Trust Certificate List page appears with the new certificate. Related Topics User Certificate Authentication, page 6 Overview of EAP-TLS, page 5 Editing a Certificate Authority and Configuring Certificate Revocation Lists Use this page to edit a trusted CA (Certificate Authority) certificate. 1.Choose Users and Identity Stores > Certificate Authorities. The Trust Certificate page...
Page 216
8 Managing Users and Identity Stores Configuring CA Certificates Table 63 Edit Certificate Authority Properties Page Option Description Issuer Friendly Name The name that is associated with the certificate. Description (Optional) A brief description of the CA certificate. Issued ToDisplay only. The entity to which the certificate is issued. The name that appears is from the certificate subject. Issued ByDisplay only. The certification authority that issued the certificate. Valid fromDisplay only. The...
Page 217
8 Managing Users and Identity Stores Configuring CA Certificates 3.Click Submit. The Trust Certificate page appears with the edited certificate. The administrator has the rights to configure CRL and OCSP verification. If both CRL and OCSP verification are configured at the same time, then ACS performs OCSP verification first. If it detects any communication problems with either the primary or secondary servers, or if the verification returns the status of a given certificate as unknown, then ACS...
Page 218
8 Managing Users and Identity Stores Configuring CA Certificates This System Failure occurred: Certificate Authority is in use by one of the ACS nodes certificates. Your changes have not been saved. Click OK to return to the list page. If you want to delete or renew a CA certificate which is part of EAP or management certificate chain, we must map or unbind the EAP or management protocols to another server certificate that is not issued by the CA certificate and then renew or delete it. To renew or...
Page 219
8 Managing Users and Identity Stores Configuring Certificate Authentication Profiles Related Topics User Certificate Authentication, page 6 Overview of EAP-TLS, page 5 Configuring Certificate Authentication Profiles The certificate authentication profile defines the X509 certificate information to be used for a certificate- based access request. You can select an attribute from the certificate to be used as the username. You can select a subset of the certificate attributes to populate the...
Page 220
9 Managing Users and Identity Stores Configuring Identity Store Sequences Click Create. Check the check box next to the certificate authentication profile that you want to duplicate, then click Duplicate. Click the certificate authentication profile that you want to modify, or check the check box next to the name and click Edit. The Certificate Authentication Profile Properties page appears. 3.Complete the fields in the Certificate Authentication Profile Properties page as described in Table 64 on...