Chapter 11 Working with User Databases
Deleting an External User Database Configuration
11-66
User Guide for Cisco Secure ACS for Windows Server
78-14696-01, Version 3.1
Step 3
Click Database Configuration.
Result: Cisco Secure ACS lists all possible external user database types.
Step 4
Click RSA SecurID Token Server.
Result: If no RSA SecurID token server configuration exists, the Database
Configuration Creation table appears. Otherwise, the External User Database
Configuration page appears.
Step 5
If you are creating a configuration, follow these steps:
a.
Click Create New Configuration.
b.
Type a name for the new configuration for the RSA SecurID token server in
the box provided, or accept the default name in the box.
c.
Click Submit.
Result: Cisco Secure ACS lists the new configuration in the External User
Database Configuration table.
Step 6
Click Configure.
Result: Cisco Secure ACS displays the name of the token server and the path to
the authenticator DLL. This information confirms that Cisco Secure ACS can
contact the RSA client. You can add the RSA SecurID external user database to
your Unknown User Policy or assign specific user accounts to use this database
for authentication. For more information about the Unknown User Policy, see
Unknown User Processing, page 12-1
. For more information about configuring
user accounts to authenticate using this database, see
Chapter 7, “Setting Up and
Managing User Accounts.”
Deleting an External User Database Configuration
If you no longer need a particular external user database configuration, you can
delete it from Cisco Secure ACS.
To delete an external user database configuration, follow these steps:
Step 1
In the navigation bar, click External User Databases.
Step 2
Click Database Configuration.