Chapter 21. Authentication Authorization Accounting - Samsung Ubigate iBG3026 Configuration Manual

Hide thumbs Also See for Ubigate iBG3026:
Table of Contents

Advertisement

CHAPTER 21.
Authorization Accounting
The combination of accounting controls, authorization requirements, and
authentication checks(AAA) is a framework for configuring security functions
across the network in a consistent fashion. Each component of AAA can be
implemented separately.
Authentication
Authentication is the process of determining that you are who you say you are.
Typical methods of determining user identities is thorough login and password
responses, encryption, and the like. AAA authentication defines the
authentication methods, and then applies these methods to each interface.
By default, there is a method list that is automatically applied to all interfaces.
When you define a method list, it overrides this default method list.
Authorization
AAA Authorization controls remote access by defining the methods used to
authorize user activities on the network. In other words, authorization is the
process of determining what you are allowed to do. Authorization manages a
set of attributes describing what each user is allowed to do when they access
the network. This set of attributes is typically stored in a database for each
user, and when a user requests access, AAA authorization looks up what this
user is allowed to do and grants the appropriate access privileges.
The authorization database can be located on the router, on an access server, or
remotely hosted. Remote Authentication Dial In User Service(RADIUS) and
Terminal Access Controller Access Control System+(TACACS+) servers are
typical of remotely hosted authorization database servers.(iBG3026 only
supports TACACS+, not TACACS.)
© SAMSUNG Electronics Co., Ltd.
Authentication
Ubigate iBG3026 Configuration Guide
223

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents