8-31
User Guide for Cisco Secure ACS for Windows Server
78-14696-01, Version 3.1
Chapter 8 Establishing Cisco Secure ACS System Configuration
RDBMS Synchronization
The topics in this section provide an overview of the kinds of configuration that
RDBMS Synchronization can automate. You specify the actions in a relational
database table or text file named accountActions. For more information about
accountActions, see
About the accountActions Table, page 8-34
. For specific
information about all actions that RDBMS Synchronization can perform, see
Appendix F, “RDBMS Synchronization Import Definitions.”
Users
Among the user-related configuration actions that RDBMS Synchronization can
perform are the following:
•
Adding users
•
Deleting users
•
Setting passwords
•
Setting user group memberships
•
Setting Max Sessions parameters
•
Setting network usage quota parameters
•
Configuring command authorizations
•
Configuring network access restrictions
•
Configuring time-of-day/day-of-week access restrictions
•
Assigning IP addresses
•
Specifying outbound RADIUS attribute values
•
Specifying outbound attribute values
Note
For specific information about all actions that RDBMS Synchronization can
perform, see
Appendix F, “RDBMS Synchronization Import Definitions.”