Page 180
Manual
ResistTel IP2 / IP152
ExResistTel IP2 / IP154
Disable local authentication
If this option is selected only users from the Kerberos server are accepted. Logins
using local administrator accounts will be rejected.
4.3.2.1
Delegated Authentication
4.3.2.1.1
Overview
Each device has its own administrator/viewer accounts.
In version 8 and later a single device can act as an authentication server for the rest
of the devices. User accounts that are managed on the authentication server can be
used to login on each device in the installation. You can also configure devices to
accept user accounts from a PBX or a Windows domain.
4.3.2.1.2
How it works
Version 8 devices can use Kerberos to authenticate users that are not managed
locally but on a remote Kerberos server.
4.3.2.1.2.1
Kerberos
A Kerberos server manages users and services for a realm that is specified by a
distinct name. It shares a secret password with each user and each service. Users
can obtain a ticket for a service from the Kerberos server if they prove that they
know their own password. Services can then authenticate users by validating tickets
instead of passwords. Therefore many devices can be accessed using the same user
credentials but only the Kerberos server and the user have to know it.
4.3.2.1.2.2
Logging in
The main idea of how the centralized login process works in version 8 is the
following:
Summary of Contents for ExResistTel IP2/IP154
Page 43: ...Manual ResistTel IP2 IP152 Page 43 ExResistTel IP2 IP154 Figure 9 Set View ...
Page 386: ...Page 386 Manual ResistTel IP2 IP152 ExResistTel IP2 IP154 ...
Page 387: ...Manual ResistTel IP2 IP152 Page 387 ExResistTel IP2 IP154 ...
Page 390: ...Page 390 Manual ResistTel IP2 IP152 ExResistTel IP2 IP154 ...