Authentication Using Internal Database - ADTRAN BlueSecure Controller Setup And Administration Manual

Software release version: 6.5
Table of Contents

Advertisement

5
BlueSecure™ Controller Setup and Administration Guide

Authentication Using Internal Database

Follow the procedures given in this chapter if:
You are using the BSC's internal database for user authentication. We refer
to users who are authenticated against the BSC's internal database as
"local" or "native" BSC users.
You have wireless devices that the BSC can authenticate only by using their
device media access control (MAC) address. Certain wireless devices do
not support login via web browser; the BSC can only authenticate and
assign them a role based on their MAC address.
This chapter covers the following topics:
Local BSC User Authentication
Creating/Editing/Deleting a Local User Account
Defining MAC Address Authentication
Refer to Chapter 6, "Authentication Using External Servers," for procedures to
configure RADIUS, LDAP/Active Directory, External NTLM, Transparent NTLM
Windows, or Transparent 802.1x, Kerberos, Cosign, Pubcookie, or Central
Authentication Service (CAS) user authentication.
Refer to "The BSC Internal 802.1x Authentication Server" on page 6-19 for
information about configuring the 802.1x authentication server running on the
BSC to terminate TTLS (Tunneled Transport Layer Security Protocol), PEAP
(Protected Extensible Authentication Protocol) and FAST (Flexible Authentication
via Secure Tunneling Protocol) when used to pass inner authentication
credentials through an encrypted tunnel.
5-1

Advertisement

Table of Contents
loading

Table of Contents