Cisco 3.3 User Manual page 97

For windows server version 3.3
Table of Contents

Advertisement

Chapter 2
Deployment Considerations
78-16592-01
Along with the decision to implement an external user database (or
databases), you should have detailed plans that specify your requirements for
Cisco Secure ACS database replication, backup, and synchronization. These
aspects of configuring CiscoSecure user database management are detailed in
Chapter 8, "System Configuration:
Configure Shared Profile Components—With most aspects of network
configuration already established and before configuring user groups, you
should configure your Shared Profile Components. When you set up and
name the network access restrictions and command authorization sets you
intend to employ, you lay out an efficient basis for specifying user group and
single user access privileges. For more information about Shared Profile
Components, see
Chapter 5, "Shared Profile
Configure Groups—Having previously configured any external user
databases you intend to employ, and before configuring your user groups, you
should decide how to implement two other Cisco Secure ACS features related
to external user databases: unknown user processing and database group
mapping. For more information, see
page 15-4
and
Chapter 16, "User Group Mapping and
you can configure your user groups with a complete plan of how Cisco Secure
ACS is to implement authorization and authentication. For more information,
see
Chapter 6, "User Group
Configure Users—With groups established, you can establish user accounts.
Remember that a particular user can belong to only one user group, and that
settings made at the user level override settings made at the group level. For
more information, see
Configure Reports—Using the Reports and Activities section of the
Cisco Secure ACS HTML interface, you can specify the nature and scope of
logging that Cisco Secure ACS performs. For more information, see
Chapter 1,
"Overview".
User Guide for Cisco Secure ACS for Windows Server
Basic".
About Unknown User Authentication,
Management".
Chapter 7, "User
Management".
Suggested Deployment Sequence
Components".
Specification". Then,
2-21

Advertisement

Table of Contents
loading

This manual is also suitable for:

Secure access control serverSecure acs

Table of Contents