Cisco 3.3 User Manual page 68

For windows server version 3.3
Table of Contents

Advertisement

Cisco Secure ACS HTML Interface
User Guide for Cisco Secure ACS for Windows Server
1-28
advanced features such as database replication, see
Configuration:
Advanced". For information about configuring
authentication protocols and certificate-related features, see
"System Configuration: Authentication and
information about configuring logs and reports, see
and
Reports".
Interface Configuration—Display or hide product features and options
to be configured. For more information about the Interface Configuration
section,
Chapter 3, "Interface
Administration Control—Define and configure access policies. For
more information about the Administration Control section,
"Administrators and Administrative
External User Databases—Configure databases, the Unknown User
Policy, and user group mapping. For information about configuring
databases, see
Chapter 13, "User
Unknown User Policy, see
information about user group mapping, see
Mapping and
Specification".
Reports and Activity—Display accounting and logging information.
For information about viewing reports, see
Reports".
Online Documentation—View the user guide. For information about
using the online documentation, see
Documentation, page
Configuration Area—The frame in the middle of the browser window, the
configuration area displays web pages that belong to one of the sections
represented by the buttons in the navigation bar. The configuration area is
where you add, edit, or delete information. For example, you configure user
information in this frame on the User Setup Edit page.
Most pages have a Submit button at the bottom. Click Submit to
Note
confirm your changes. If you do not click Submit, changes are not
saved.
Display Area—The frame on the right of the browser window, the display
area shows one of the following options:
Configuration".
Policy".
Databases". For information about the
Chapter 15, "Unknown User
Chapter 16, "User Group
Chapter 11, "Logs and
Online Help and Online
1-33.
Chapter 1
Overview
Chapter 9, "System
Chapter 10,
Certificates". For
Chapter 11, "Logs
Chapter 12,
Policy". For
78-16592-01

Advertisement

Table of Contents
loading

This manual is also suitable for:

Secure access control serverSecure acs

Table of Contents