Managing System Access; Enable External Authentication - Polycom RealPresence Group Series Administrator's Manual

Hide thumbs Also See for RealPresence Group Series:
Table of Contents

Advertisement

Managing System Access

You can control how users and administrators access the system.
You can set up local and external authentication for the following system interfaces:
Local interface
System web interface
Command-line API (external authentication is available only when accessing the API using SSH)

Enable External Authentication

You can set up external authentication through Active Directory for your system.
The system can map only one Active Directory group to a given role.
Procedure
1. In the system web interface, go to Admin Settings > Security > Global Security >
Authentication.
2. Configure these settings on the Authentication screen, then click Save.
Setting
Enable Active Directory External Authentication
Active Directory Server Address
Active Directory Admin Group
Polycom, Inc.
Description
Specifies whether to authenticate users with the Active
Directory server. When you enable Active Directory
authentication, users can log in to the system with their
network credentials using this format: domain\user.
With this format, users can have accounts on multiple
domains.
Specifies the Active Directory server's FQDN or IP
address. If you are using subdomains, append port
number 3268 as follows: ad.domain.com:3268.
You can alternatively use RealPresence Resource
Manager as an Active Directory server and enter its
address here.
If you enable Always Validate Peer Certificates from
Server on the Certificates page, make sure this value
matches what is in the Active Directory server
certificate. For example, if you enter the Active
Directory server IP address here, but the certificate
only has the server's FQDN, external authentication
fails.
Specifies the Active Directory group whose members
should have administrator access to the system. This
name must exactly match the name in the Active
Directory server for successful authentication.
Securing the System
83

Advertisement

Table of Contents
loading

Table of Contents