Authenticating Users - Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1 Administration Manual

Strm log management administration guide
Hide thumbs Also See for SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1:
Table of Contents

Advertisement

Authenticating
Users
Step 1
Step 2
You can configure authentication to validate STRM Log Management users and
passwords. STRM Log Management supports the following user authentication
types:
System Authentication - Users are authenticated locally by STRM Log
Management. This is the default authentication type.
RADIUS Authentication - Users are authenticated by a Remote Authentication
Dial-in User Service (RADIUS) server. When a user attempts to login, STRM
Log Management encrypts the password only, and forwards the username and
password to the RADIUS server for authentication.
TACACS Authentication - Users are authenticated by a Terminal Access
Controller Access Control System (TACACS) server. When a user attempts to
login, STRM Log Management encrypts the username and password, and
forwards this information to the TACACS server for authentication.
LDAP/ Active Directory - Users are authenticated by a Lightweight Directory
access Protocol) server using Kerberos.
If you wish to configure RADIUS, TACACS, or LDAP/Active Directory as the
authentication type, you must :
Configure the authentication server before you configure authentication in
STRM Log Management.
Make sure the server has the appropriate user accounts and privilege levels to
communicate with STRM Log Management. See your server documentation for
more information.
Make sure the time of the authentication server is synchronized with the time of
the STRM Log Management server. For more information on setting STRM Log
Management time, see
Once authentication is configured and a user enters an invalid username and
password combination, a message appears indicating the login was invalid. if the
user attempts to access the system multiple times using invalid information, the
user must wait the configured amount of time before attempting to access the
system again. For more information on configuring system settings for
authentication, see
Chapter 3 Setting Up STRM Log Management
the Console
Settings. An administrative user can always access STRM Log
Management through a third party authentication module or by using the local
STRM Log Management Admin password
To configure authentication:
In the Administration Console, click the System Configuration tab.
The System Configuration panel appears.
Click the Authentication icon.
The Authentication window appears.
STRM Log Management Administration Guide
Chapter 3 Setting Up STRM Log

Authenticating Users

Management.
-
Configuring
15

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1 and is the answer not in the manual?

Table of Contents