Cisco 2509 - Router - EN User Manual page 437

User guide
Hide thumbs Also See for 2509 - Router - EN:
Table of Contents

Advertisement

Chapter 11
Working with User Databases
Under External User Database Configuration, select the name of the LDAP
Step 5
database you need to configure.
Note
Step 6
Click Configure.
If you click Delete, the configuration of the selected LDAP database is deleted.
Caution
Step 7
If you do not want Cisco Secure ACS to filter LDAP authentication requests by
username, under Domain Filtering, select Process all usernames.
Step 8
If you want to limit authentications processed by this LDAP configuration to
usernames with a specific domain qualification, follow these steps:
Note
a.
b.
c.
78-14696-01, Version 3.1
If only one LDAP configuration exists, the name of that configuration
appears instead of the list. Proceed to Step 6.
For information about domain filtering, see
page
11-18.
Under Domain Filtering, select Only process usernames that are domain
qualified.
From the "Qualified by" list, select the applicable type of domain
qualification, either Suffix or Prefix. Only one type of domain qualification
is supported per LDAP configuration.
For example, if you want this LDAP configuration to authenticate usernames
that begin with a specific domain name, select Prefix. If you want this LDAP
configuration to authenticate usernames that end with a specific domain
name, select Suffix.
In the Domain Qualifier box, type the name of the domain that you want this
LDAP configuration to authenticate usernames for. Include the delimiting
character that separates the user ID from the domain name. Be sure that the
delimiting character appears in the applicable position: at the end of the
domain name if Prefix is selected on the "Qualified by" list; at the beginning
of the domain name if Suffix is selected on the "Qualified by" list.
Only one domain name is supported per LDAP configuration. You can type
up to 512 characters.
User Guide for Cisco Secure ACS for Windows Server
Generic LDAP
Domain Filtering,
11-29

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Secure acs

Table of Contents