Authenticating Users - Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 Administration Manual

Strm administration guide
Hide thumbs Also See for SECURITY THREAT RESPONSE MANAGER 2008.2:
Table of Contents

Advertisement

18
M
U
ANAGING
SERS
Authenticating
Users
Step 1
Step 2
You can configure authentication to validate STRM users and passwords. STRM
supports the following user authentication types:
System Authentication - Users are authenticated locally by STRM. This is the
default authentication type.
RADIUS Authentication - Users are authenticated by a Remote Authentication
Dial-in User Service (RADIUS) server. When a user attempts to login, STRM
encrypts the password only, and forwards the username and password to the
RADIUS server for authentication.
TACACS Authentication - Users are authenticated by a Terminal Access
Controller Access Control System (TACACS) server. When a user attempts to
login, STRM encrypts the username and password, and forwards this
information to the TACACS server for authentication.
LDAP/ Active Directory - Users are authenticated by a Lightweight Directory
Access Protocol (LDAP) server using Kerberos.
If you wish to configure RADIUS, TACACS, or LDAP/Active Directory as the
authentication type, you must :
Configure the authentication server before you configure authentication in
STRM.
Make sure the server has the appropriate user accounts and privilege levels to
communicate with STRM. See your server documentation for more information.
Make sure the time of the authentication server is synchronized with the time of
the STRM server. For more information on setting STRM time, see
Setting Up
STRM.
Make sure all users have appropriate user accounts and roles in STRM to allow
authentication with the third party servers.
Once authentication is configured and a user enters an invalid username and
password combination, a message appears indicating the login was invalid. if the
user attempts to access the system multiple times using invalid information, the
user must wait the configured amount of time before attempting to access the
system again. For more information on configuring system settings for
authentication, see
Chapter 3 Setting Up STRM
Settings. An administrative user can always access STRM through a third party
authentication module or by using the local STRM Admin password.
To configure authentication:
In the Administration Console, click the System Configuration tab.
The System Configuration panel appears.
Click the Authentication icon.
The Authentication window appears.
STRM Administration Guide
-
Configuring the Console
Chapter 3

Advertisement

Table of Contents
loading

Table of Contents