Chapter 6 Setting Up and Managing User Groups
Configuration-specific User Group Settings
6-50
User Guide for Cisco Secure ACS for Windows Server
78-14696-01, Version 3.1
Step 5
In the BBSM RADIUS Attributes table, specify the attribute to be authorized for
the group by selecting the check box next to the attribute. Where applicable,
further define the authorization for that attribute in the field next to it. For more
information about attributes, see
Appendix C, “RADIUS Attributes,”
or the
documentation for network devices using RADIUS.
Note
The MS-CHAP-MPPE-Keys attribute value is autogenerated by
Cisco Secure ACS; there is no value to set in the HTML interface.
Step 6
To save the group settings you have just made, click Submit.
For more information, see
Saving Changes to User Group Settings, page 6-53
.
Step 7
To continue specifying other group settings, perform other procedures in this
chapter, as applicable.
Configuring Custom RADIUS VSA Settings for a User Group
User-defined, custom Radius VSA configurations appear only when all the
following are true:
•
You have defined and configured the custom RADIUS VSAs. (For
information about creating user-defined RADIUS VSAs, see
Custom
RADIUS Vendors and VSAs, page 8-33
.)
•
A network device has been configured in Network Configuration that uses a
RADIUS protocol that supports the custom VSA.
•
Group-level custom RADIUS attributes have been enabled on the RADIUS
(Name) page of the Interface Configuration section.
You must configure both the IETF RADIUS and the custom RADIUS attributes.
To configure and enable custom RADIUS attributes to be applied as an
authorization for each user in the current group, follow these steps:
Step 1
Confirm that your IETF RADIUS attributes are configured properly.
For more information about setting IETF RADIUS attributes, see
Configuring
IETF RADIUS Settings for a User Group, page 6-37
.