Cisco Systems Servers Server User Manual


 
Chapter 11 Working with User Databases
Token Server User Databases
11-56
Cisco Secure ACS 3.0 for Windows 2000/NT Servers User Guide
78-13751-01, Version 3.0
Step 4 If you are creating a configuration, follow these steps:
a. Click Create New Configuration.
b. Type a name for the new configuration for the AXENT token server in the
box provided, or accept the default name in the box.
c. Click Submit.
Result: Cisco Secure ACS lists the new configuration in the External User
Database Configuration table.
Step 5 Click Configure.
Step 6 In the following boxes, type the required information:
Server NameName of the defender security server.
Server AddressIP address of the defender security server.
Server PortPort number of the defender security server.
Communication TimeoutNumber of seconds to wait before sending
notification to the user that the connection has timed out.
Agent IDIdentification of an agent that has been approved by the server.
Agent KeyAgents SNK key in hexadecimal numbers (00 to FF).
Step 7 Click Submit.
Result: Cisco Secure ACS saves the AXENT token server database configuration
you created. You can add it to your Unknown User Policy or assign specific user
accounts to use this database for authentication. For more information about the
Unknown User Policy, see the Unknown User Processing section on page 12-1.
For more information about configuring user accounts to authenticate using this
database, see Chapter 7, Setting Up and Managing User Accounts.
Configuring an RSA SecurID Token Server External User Database
Cisco Secure ACS supports the RSA SecurID token server custom interface for
authentication of users. You can create only one RSA SecurID configuration
within Cisco Secure ACS.