Cisco Systems 3.3 Server User Manual


 
Chapter6 User Group Management
Configuration-specific User Group Settings
6-48
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
The following Cisco Secure ACS RADIUS protocols support the Microsoft
RADIUS VSA:
Cisco IOS/PIX
Cisco VPN 3000
Ascend
Microsoft RADIUS represents only the Microsoft VSA. You must configure both
the IETF RADIUS and Microsoft RADIUS attributes.
Note To hide or display Microsoft RADIUS attributes, see Setting Protocol
Configuration Options for Non-IETF RADIUS Attributes, page 3-17. A VSA
applied as an authorization to a particular group persists, even when you remove
or replace the associated AAA client; however, if you have no AAA clients of this
(vendor) type configured, the VSA settings do not appear in the group
configuration interface.
To configure and enable Microsoft RADIUS attributes to be applied as an
authorization for each user in the current group, follow these steps:
Step 1 Confirm that your IETF RADIUS attributes are configured properly.
For more information about setting IETF RADIUS attributes, see Configuring
IETF RADIUS Settings for a User Group, page 6-38.
Step 2 In the navigation bar, click Group Setup.
The Group Setup Select page opens.
Step 3 From the Group list, select a group, and then click Edit Settings.
The Group Settings page displays the name of the group at its top.
Step 4 From the Jump To list at the top of the page, choose RADIUS (Microsoft).
Step 5 In the Microsoft RADIUS Attributes table, specify the attributes to be authorized
for the group by selecting the check box next to the attribute. Where applicable,
further define the authorization for that attribute in the field next to it. For more
information about attributes, see Appendix C, “RADIUS Attributes”, or the
documentation for network devices using RADIUS.