Cisco Systems Servers Server User Manual


 
12-9
Cisco Secure ACS 3.0 for Windows 2000/NT Servers User Guide
78-13751-01, Version 3.0
Chapter 12 Administering External User Databases
Unknown User Processing
Step 3 To deny authentication requests for any unknown user, select the Fail the attempt
option.
Step 4 To allow authentication requests for unknown users, follow these steps:
a. Select the Check the following external user databases option.
b. For each database you need Cisco Secure ACS to use when attempting to
authenticate unknown users, select the database in the External Databases list
and click > (right arrow button) to move it to the Selected Databases list.
To remove a database from the Selected Databases list, select the database,
and then click < (left arrow button) to move it back to the External
Databases list.
c. To assign the order in which Cisco Secure ACS should use the selected
external databases when attempting to authenticate an unknown user, click a
database name in the Selected Databases list and click Up or Down to move
it into the position you want.
d. Repeat Steps a through c until the selected databases are in the order needed.
Step 5 Click Submit.
Result: Cisco Secure ACS saves and implements the Unknown User Policy
configuration you created. Cisco Secure ACS attempts to authenticate unknown
users using the databases in the order listed in the Selected Databases list.
Turning off External User Database Authentication
You can configure Cisco Secure ACS so that users who are not in the
Cisco Secure ACS database are not permitted to authenticate.
To turn off external user database authentication, follow these steps:
Step 1 In the navigation bar, click External User Databases.
Step 2 Click Unknown User Policy.