![Ruckus Wireless ZoneDirector 1200 User Manual Download Page 233](http://html1.mh-extra.com/html/ruckus-wireless/zonedirector-1200/zonedirector-1200_user-manual_1498797233.webp)
Figure 160: Enable RBAC policy enforcement for a WLAN
Managing Automatically Generated User Certificates
and Keys
With Ruckus Dynamic PSK, a unique key or certificate is automatically generated for
each wireless user. Similarly, for a WLAN configured with 802.1X/EAP authentication, a
unique certificate for each wireless user is created.
When using the internal user database, automatically generated user certificates and
keys are deleted whenever the associated user account is deleted from the user database.
In the case of using Windows Active Directory, LDAP or RADIUS as an authentication
server, you can delete the generated user keys and certificates by following these steps:
1.
Go to
Monitor
>
Generated PSK/Certs
. The Generated PSK/Certs page appears.
2.
Select the check boxes for the PSKs and Certificates that you want to delete.
3.
Click
Delete
to delete the selected items.
The selected PSKs and Certificates are deleted from the system. A user with a deleted
PSK or a deleted certificate will not be able to connect to the wireless network without
obtaining a new key or a new certificate.
Using an External Server for User Authentication
Once your wireless network is set up, you can instruct ZoneDirector to authenticate
wireless users using your existing Authentication, Authorization and Accounting (AAA)
server. The following types of AAA servers are supported:
• Active Directory
233
Ruckus Wireless ZoneDirector™ Release 10.0 User Guide
Managing User Access
Managing Automatically Generated User Certificates and Keys