Managing System Access; External Authentication - Polycom HDX 4000 Series Administrator's Manual

Hide thumbs Also See for HDX 4000 Series:
Table of Contents

Advertisement

Managing System Access

External Authentication

Polycom, Inc.
Artisan Technology Group - Quality Instrumentation ... Guaranteed | (888) 88-SOURCE | www.artisantg.com
Click Yes in the security dialogs that appear. This access uses port 443.
2
To access Admin Settings using the Polycom HDX web interface when a
3
Admin Remote Access Password is set, enter the Admin ID as the user
name (default is admin).
Polycom HDX systems support two roles for accessing the system, an admin
role and a user role. Admins can perform administrator activities such as
changing configuration, as well as user activities such as placing and
answering calls. Users can perform only user-type activities.
When the Polycom HDX system is paired with a Polycom Touch Control, only the
local Polycom HDX system admin account credentials can be used to pair with the
HDX system.
Polycom HDX systems provide two local accounts, one for the user role (by
default named user) and one with for the admin role (by default named
admin). The IDs and passwords for these local accounts are stored on the HDX
system itself.
An administrator can configure HDX systems to grant access using network
accounts that are authenticated through an Active Directory (AD) server such
as the Microsoft Active Directory server. In this case, the account information
is stored on the AD server and not on the HDX system. The AD administrator
assigns accounts to AD groups, one for HDX system admin access and one for
user access. For this reason, external authentication is also referred to as Active
Directory authentication.
The HDX system administrator configures the external authentication settings
on the HDX system to specify the address of an AD Server for authenticating
user logins, AD group for user access, and AD group for admin access on the
HDX system. The HDX system can map only one Active Directory group to a
given role.
Security
8–5

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents