Supported Users
A SecurID Ace server supports the following types of users and authentication features:
•
Auth users
•
L2TP users (user authentication; L2TP user receives default L2TP settings from the
security device)
•
XAuth users (user authentication; no support for remote setting assignments)
•
Admin users (user authentication; administrator user receives default privilege
assignment of read-only)
A SecurID ACE server can store L2TP, XAuth, and device administrator user accounts for
authentication purposes; but it cannot assign L2TP, XAuth remote settings, or device
administrator privileges.
Configuring an LDAP Authentication Server
Lightweight Directory Access Protocol (LDAP) a protocol for organizing and accessing
information in a hierarchical structure resembling a branching tree. LDAP is used to locate
resources, such as organizations, individuals, and files on a network, and helps
authenticate users attempting to connect to networks controlled by directory servers.
To create an LDAP authentication server object, configure the following:
•
LDAP Server Port: The port number on the LDAP server to which the security device
sends authentication requests. The default port number is 389.
•
Common Name Identifier: The identifier used by the LDAP server to identify the
individual entered in a LDAP server. For example, an entry of “uid” means “ user ID” and
“cn” for “ common name.”
•
Distinguished Name (dn): The path used by the LDAP server before using the common
name identifier to search for a specific entry. (For example, c=us;o=juniper, where “c”
stands for “country,” and “o” for “organization.”)
Supported Users
An LDAP server supports the following types of users and authentication features:
•
Auth users
•
L2TP users (user authentication; L2TP user receives default L2TP settings from the
security device)
•
XAuth users (user authentication; no support for remote setting assignments)
•
Admin users (user authentication; administrator user receives default privilege
assignment of read-only)
LDAP servers cannot assign L2TP or XAuth remote settings.
403
Copyright © 2010, Juniper Networks, Inc.
Chapter 8: Configuring Objects
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...