About Rdbms Synchronization - Cisco 2509 - Router - EN User Manual

User guide
Hide thumbs Also See for 2509 - Router - EN:
Table of Contents

Advertisement

RDBMS Synchronization

About RDBMS Synchronization

User Guide for Cisco Secure ACS for Windows Server
8-30
Cisco Secure ACS Database Recovery Using the accountActions Table,
page 8-36
Reports and Event (Error) Handling, page 8-37
Preparing to Use RDBMS Synchronization, page 8-37
Considerations for Using CSV-Based Synchronization, page 8-38
Configuring a System Data Source Name for RDBMS Synchronization,
page 8-40
RDBMS Synchronization Options, page 8-41
Performing RDBMS Synchronization Immediately, page 8-43
Scheduling RDBMS Synchronization, page 8-44
Disabling Scheduled RDBMS Synchronizations, page 8-46
The RDBMS Synchronization feature enables you to update the CiscoSecure user
database with information from an ODBC-compliant data source. The
ODBC-compliant data source can be the RDBMS database of a third-party
application. It can also be an intermediate file or database that a third-party
system updates. Regardless of where the file or database resides,
Cisco Secure ACS reads the file or database via the ODBC connection. You can
also regard RDBMS Synchronization as an API—much of what you can configure
for a user, group, or device through the Cisco Secure ACS HTML interface, you
can alternatively maintain through this feature. RDBMS Synchronization
supports addition, modification, and deletion for all data items it can access.
You can configure synchronization to occur on a regular schedule. You can also
perform synchronizations manually, updating the CiscoSecure user database on
demand.
Synchronization performed by a single Cisco Secure ACS can update the internal
databases of other Cisco Secure ACSes, so that you only need configure RDBMS
Synchronization on one Cisco Secure ACS. Cisco Secure ACSes listen on TCP
port 2000 for synchronization data. RDBMS Synchronization communication
between Cisco Secure ACSes is encrypted using 128-bit encrypted, proprietary
algorithm.
Chapter 8
Establishing Cisco Secure ACS System Configuration
78-14696-01, Version 3.1

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Secure acs

Table of Contents