11-57
User Guide for Cisco Secure ACS for Windows Server
78-14696-01, Version 3.1
Chapter 11 Working with User Databases
Token Server User Databases
•
Retries—The number of authentication attempts Cisco Secure ACS makes
before failing over to the secondary proxy RADIUS server.
•
Failback Retry Delay (minutes)—The number of minutes after which
Cisco Secure ACS attempts authentications using a failed primary proxy
RADIUS server.
Note
If both the primary and the secondary servers fail, Cisco Secure ACS
alternates between both servers until one responds.
Step 8
Click Submit.
Result: Cisco Secure ACS saves the proxy RADIUS token server database
configuration you created. You can add it to your Unknown User Policy or assign
specific user accounts to use this database for authentication. For more
information about the Unknown User Policy, see
Unknown User Processing,
page 12-1
. For more information about configuring user accounts to authenticate
using this database, see
Chapter 7, “Setting Up and Managing User Accounts.”
Token Server User Databases
Cisco Secure ACS supports the use of token servers for the increased security
provided by one-time passwords (OTPs). This section includes the following
topics:
•
About Token Servers and Cisco Secure ACS, page 11-57
•
RADIUS-Enabled Token Servers, page 11-59
•
RSA SecurID Token Servers, page 11-64
About Token Servers and Cisco Secure ACS
Cisco Secure ACS provides ASCII, PAP, and PEAP(EAP-GTC) authentication
using token servers. Other authentication protocols are not supported with token
server databases.