
Chapter 11 Working with User Databases
LEAP Proxy RADIUS Server Database
11-54
User Guide for Cisco Secure ACS for Windows Server
78-14696-01, Version 3.1
Step 14
Click Submit.
Result: Cisco Secure ACS saves the ODBC configuration you created. You can
add it to your Unknown User Policy or assign specific user accounts to use this
database for authentication. For more information about the Unknown User
Policy, see
Unknown User Processing, page 12-1
. For more information about
configuring user accounts to authenticate using this database, see
Chapter 7,
“Setting Up and Managing User Accounts.”
LEAP Proxy RADIUS Server Database
For Cisco Secure ACS-authenticated users accessing your network via Cisco
Aironet devices, Cisco Secure ACS supports ASCII, PAP, MS-CHAP (versions 1
and 2), LEAP, and EAP-TLS authentication with a proxy RADIUS server. Other
authentication protocols are not supported with LEAP Proxy RADIUS Server
databases.
Note
Authentication protocols not supported with LEAP Proxy RADIUS Server
databases may be supported by another type of external user database. For more
information about authentication protocols and the external database types that
support them, see
Authentication Protocol-Database Compatibility, page 1-9
.
Cisco Secure ACS uses MS-CHAP version 1 for LEAP Proxy RADIUS Server
authentication. To manage your proxy RADIUS database, refer to your RADIUS
database documentation.
Lightweight extensible authentication protocol (LEAP) proxy RADIUS server
authentication allows you to authenticate users against existing Kerberos
databases that support MS-CHAP authentication. You can use the LEAP Proxy
RADIUS Server database to authenticate users with any third-party RADIUS
server that supports MS-CHAP authentication.