Cisco Acs 5x User Guide
Here you can view all the pages of manual Cisco Acs 5x User Guide. The Cisco manuals for Control System are available online for free. You can easily download all the documents as PDF.
Page 151
7-21 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 7 Managing Network Resources Working with External Proxy Servers NoteIf you want ACS to forward unknown RADIUS attributes you have to define VSAs for proxy. Related Topics RADIUS and TACACS+ Proxy Services, page 3-7 RADIUS and TACACS+ Proxy Requests, page 4-29 Configuring General Access Service Properties, page 10-13 Deleting External Proxy Servers, page 7-21 Deleting External Proxy Servers To delete an external proxy...
Page 152
7-22 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 7 Managing Network Resources Working with External Proxy Servers
Page 153
CH A P T E R 8-1 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 8 Managing Users and Identity Stores Overview ACS manages your network devices and other ACS clients by using the ACS network resource repositories and identity stores. When a host connects to the network through ACS requesting access to a particular network resource, ACS authenticates the host and decides whether the host can communicate with the network resource. To authenticate and authorize a user or host, ACS uses...
Page 154
8-2 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 8 Managing Users and Identity Stores Overview Fixed components are: Name Description Password Enabled or disabled status Identity group to which users belong Configurable components are: Enable password for TACACS+ authentication Sets of identity attributes that determine how the user definition is displayed and entered Cisco recommends that you configure identity attributes before you create users. When identity...
Page 155
8-3 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 8 Managing Users and Identity Stores Overview Identity Stores with Two-Factor Authentication You can use the RSA SecurID Token Server and RADIUS Identity Server to provide two-factor authentication. These external identity stores use an OTP that provides greater security. The following additional configuration options are available for these external identity stores: Identity caching—You can enable identity caching for...
Page 156
8-4 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 8 Managing Users and Identity Stores Managing Internal Identity Stores Identity Sequences You can configure a complex condition where multiple identity stores and profiles are used to process a request. You can define these identity methods in an Identity Sequence object. The identity methods within a sequence can be of any type. The identity sequence is made up of two components, one for authentication and the other...
Page 157
8-5 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 8 Managing Users and Identity Stores Managing Internal Identity Stores Authentication information NoteACS 5.3 supports authentication for internal users against the internal identity store only. This section contains the following topics: Authentication Information, page 8-5 Identity Groups, page 8-6 Managing Identity Attributes, page 8-7 Configuring Authentication Settings for Users, page 8-9 Creating Internal Users,...
Page 158
8-6 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 8 Managing Users and Identity Stores Managing Internal Identity Stores Identity Groups You can assign each internal user to one identity group. Identity groups are defined within a hierarchical structure. They are logical entities that are associated with users, but do not contain data or attributes other than the name you give to them. You use identity groups within policy conditions to create logical groups of users...
Page 159
8-7 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 8 Managing Users and Identity Stores Managing Internal Identity Stores Related Topics Managing Users and Identity Stores, page 8-1 Managing Internal Identity Stores, page 8-4 Performing Bulk Operations for Network Resources and Users, page 7-8 Identity Groups, page 8-3 Creating Identity Groups, page 8-6 Deleting an Identity Group, page 8-7 Deleting an Identity Group To delete an identity group: Step 1Select Users and...
Page 160
8-8 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 8 Managing Users and Identity Stores Managing Internal Identity Stores Standard Attributes Ta b l e 8 - 1 describes the standard attributes in the internal user record. User Attributes Administrators can create and add user-defined attributes from the set of identity attributes. You can then assign default values for these attributes for each user in the internal identity store and define whether the default values are...