Example 2: Configuring Ldap Authentication With Microsoft Active Directory - Cisco PIX 500 Series Configuration Manual

Security appliance command line
Hide thumbs Also See for PIX 500 Series:
Table of Contents

Advertisement

Appendix E
Configuring an External Server for Authorization and Authentication
Configuring an External LDAP Server

Example 2: Configuring LDAP Authentication with Microsoft Active Directory

This example presents a configuration procedure for LDAP authentication with Microsoft Active
Directory. To secure the user credentials during transmission, this procedure configures the security
appliance to exchange messages with the LDAP directory over a SSL connection. It also configures the
security appliance to interpret the department attribute in the Microsoft AD user record as the group
policy to which the user is assigned. The authorization attributes for this group are retrieved from a
RADIUS server.
View the user records by clicking the User folder in the Active Directory Users and Computers window
as shown in
Figure
E-3.
Figure E-3
Active Directory Users and Computers Window Showing User Folder
Review specific user attributes and values by right-clicking the username and clicking Properties. The
Username Properties dialog box appears as shown in
Figure
E-4.
Cisco Security Appliance Command Line Configuration Guide
E-20
OL-12172-03

Advertisement

Table of Contents
loading

This manual is also suitable for:

Asa 5500 series

Table of Contents