Configuring Local Database For Management User Authentication; Ldap-Based Login Authentication Example - AudioCodes E-SBC User Manual

Hide thumbs Also See for E-SBC:
Table of Contents

Advertisement

CHAPTER 16    Services
b.
Click Clear Group.

Configuring Local Database for Management User Authentication

You can configure the device to use the Local Users table (local database) to authenticate
management users based on username-password combination. You can configure the device to
use the Local Users table (see
scenarios:
LDAP or RADIUS server is not configured (or broken connection) or always use the Local
Users table and only if the user is not found, to use the server.
Connection with the LDAP or RADIUS server fails due to a timeout. In such a scenario, the
device can deny access or verify the user's credentials (username-password) locally in the
Local Users table.
If user authentication using the Local Users table succeeds, the device grants management
access to the user; otherwise access is denied. The access level assigned to the user is also
determined by the Local Users table.
To use the Local Users table for authenticating management users:
1.
Open the Authentication Server page (Setup menu > Administration tab > Web & CLI folder
> Authentication Server).
2.
Under the General group, do the following:
a.
Configure when the Local Users table must be used to authenticate login users. From the
'Use Local Users Database' drop-down list, select one of the following:
b.
Configure whether the Local Users table must be used to authenticate login users upon
connection timeout with the server. From the 'Behavior upon Authentication Server
Timeout' drop-down list, select one of the following:
3.
Click Apply, and then reset the device with a save-to-flash for your settings to take effect.

LDAP-based Login Authentication Example

To facilitate your understanding on LDAP entry data structure and how to configure the device to
use and obtain information from this LDAP directory, a brief configuration example is described in
this section. The example applies to LDAP-based user login authentication and authorization
(access level), and assumes that you are familiar with other aspects of LDAP configuration (e.g.,
LDAP server's address).
The LDAP server's entry data structure schema in the example is as follows:
Configuring Management User Accounts
This feature is applicable to LDAP and RADIUS.
This feature is applicable only to user management authentication.
When No Auth Server Defined (default): When no LDAP/RADIUS server is
configured or if a server is configured but connectivity with the server is down (if the
server is up, the device authenticates the user with the server).
Always: First attempts to authenticate the user using the Local Users table, but if not
found, it authenticates the user with the LDAP/RADIUS server.
Deny Access: User is denied access to the management platform.
Verify Access Locally (default): The device verifies the user's credentials in the
Local Users table.
Mediant 1000 Gateway & E-SBC | User's Manual
- 226 -
) upon the following

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Mediant 1000b

Table of Contents