Cisco Systems Servers Server User Manual


 
Chapter 11 Working with User Databases
Deleting an External User Database Configuration
11-58
Cisco Secure ACS 3.0 for Windows 2000/NT Servers User Guide
78-13751-01, Version 3.0
Step 4 Click RSA SecurID Token Server.
Result: If no RSA SecurID token server configuration exists, the Database
Configuration Creation table appears. Otherwise, the External User Database
Configuration page appears.
Step 5 If you are creating a configuration, follow these steps:
a. Click Create New Configuration.
b. Type a name for the new configuration for the RSA SecurID token server in
the box provided, or accept the default name in the box.
c. Click Submit.
Result: Cisco Secure ACS lists the new configuration in the External User
Database Configuration table.
Step 6 Click Configure.
Result: Cisco Secure ACS displays the name of the token server and the path to
the authenticator DLL. This information confirms that Cisco Secure ACS can
contact the RSA client. You can add the RSA SecurID external user database to
your Unknown User Policy or assign specific user accounts to use this database
for authentication. For more information about the Unknown User Policy, see the
Unknown User Processing section on page 12-1. For more information about
configuring user accounts to authenticate using this database, see Chapter 7,
Setting Up and Managing User Accounts.
Deleting an External User Database Configuration
If you no longer need a particular external user database configuration, you can
delete it from Cisco Secure ACS.
To delete an external user database configuration, follow these steps:
Step 1 In the navigation bar, click External User Databases.
Step 2 Click Database Configuration.
Result: Cisco Secure ACS displays a list of all possible external user database
types.