Cisco Servers User Manual page 86

For windows 2000/nt servers
Table of Contents

Advertisement

Suggested Deployment Sequence
Cisco Secure ACS 3.0 for Windows 2000/NT Servers User Guide
2-20
Configure External User Database—During this phase of deployment you
must decide whether and how you intend to implement an external database
to establish and maintain user authentication accounts. Typically, this
decision is made according to your existing network administration
mechanisms. For information about the types of databases Cisco Secure ACS
supports and instructions for establishing them, see
with User Databases."
Along with the decision to implement an external user database (or
databases), you should have detailed plans that specify your requirements for
Cisco Secure ACS database replication, backup, and synchronization. These
aspects of configuring CiscoSecure user database management are detailed in
Chapter 8, "Establishing Cisco Secure ACS System Configuration."
Configure Shared Profile Components—With most aspects of network
configuration already established and before configuring user groups, you
should configure your Shared Profile Components. When you set up and
name the network access restrictions and command authorization sets you
intend to employ, you lay out an efficient basis for specifying user group and
single user access privileges. For more information about Shared Profile
Components, see the
Chapter 5, "Setting Up and Managing Shared Profile
Components."
Configure Groups—Having previously configured any external user
databases you intend to employ, and before configuring your user groups, you
should decide how to implement two other Cisco Secure ACS features
related to external user databases: unknown user processing and database
group mapping. For more information see the
section on page 12-1
and the
page
12-10. Then, you are able to configure your user groups with a complete
plan of how Cisco Secure ACS is to implement authorization and
authentication. For more information, see the
Groups" section on page
Chapter 2
"Unknown User Processing"
"Database Group Mappings" section on
"Setting Up and Managing User
6-1.
Deploying Cisco Secure ACS
Chapter 11, "Working
78-13751-01, Version 3.0

Advertisement

Table of Contents
loading

This manual is also suitable for:

Secure acs 3.0

Table of Contents