Users - Cisco 2509 - Router - EN User Manual

User guide
Hide thumbs Also See for 2509 - Router - EN:
Table of Contents

Advertisement

Chapter 8
Establishing Cisco Secure ACS System Configuration

Users

Note
78-14696-01, Version 3.1
The topics in this section provide an overview of the kinds of configuration that
RDBMS Synchronization can automate. You specify the actions in a relational
database table or text file named accountActions. For more information about
accountActions, see
About the accountActions Table, page
information about all actions that RDBMS Synchronization can perform, see
Appendix F, "RDBMS Synchronization Import Definitions."
Among the user-related configuration actions that RDBMS Synchronization can
perform are the following:
Adding users
Deleting users
Setting passwords
Setting user group memberships
Setting Max Sessions parameters
Setting network usage quota parameters
Configuring command authorizations
Configuring network access restrictions
Configuring time-of-day/day-of-week access restrictions
Assigning IP addresses
Specifying outbound RADIUS attribute values
Specifying outbound TACACS+ attribute values
For specific information about all actions that RDBMS Synchronization can
perform, see
Appendix F, "RDBMS Synchronization Import Definitions."
User Guide for Cisco Secure ACS for Windows Server
RDBMS Synchronization
8-34. For specific
8-31

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Secure acs

Table of Contents