![Raritan COMMANDCENTER 2.20 - Скачать руководство пользователя страница 93](http://html1.mh-extra.com/html/raritan/commandcenter-2-20/commandcenter-2-20_user-manual_3737808093.webp)
C
HAPTER
5:
A
DMINISTRATION
T
OOLS
81
Security Manager
Authentication and Authorization
CommandCenter supports the new Raritan Authentication and Authorization Standard. This standard
specifies password rules, login rules, and IP access list rules to be followed by all products.
CommandCenter conforms to all features in this standard. As a means to slow down hackers, after three
failed attempts, the IP connection is disconnected and the source IP address is temporarily blocked (for
approximately five minutes).
User Accounts must be added to the authentication server in order to use
LDAP//RADIUS
authentication. To use CommandCenter for port level authorization, a local account with assigned ports
must be added. The user’s user name on both the authentication server and on CommandCenter must be the
same, although the passwords may be different, and the local password is used only when the
LDAP//RADIUS is disabled. If remote authentication is used, users have to contact their
Administrators in order to change their passwords on the remote server. There is no password to be
changed on the CommandCenter.
Active Directory servers may be used for remote authorization in addition to remote authentication. If a
setup uses Active Directory authentication and authorization there is no need to add users to the
CommandCenter.
When LDAP//RADIUS is enabled, authentication and authorization follow these steps:
1.
The user logs in with the appropriate user name and password.
2.
CommandCenter connects to LDAP/ or RADIUS server and sends the user name and
password.
3.
User name and password are either accepted or rejected and sent back. If authentication is rejected, this
results in a failed login attempt.
4.
If authentication is successful, local authorization is performed where CommandCenter checks if user
name entered matches a group or “users not in group” and grants privileges per the assigned policy. In
the case of Active Directory authorization, the LDAP server will return a list of group names.
CommandCenter will then match the groups and assign the appropriate privileges.
When LDAP//RADIUS Authentication is disabled, both authentication and authorization are
performed locally on CommandCenter.
Содержание COMMANDCENTER 2.20 -
Страница 2: ......
Страница 4: ...This page intentionally left blank...
Страница 12: ......
Страница 16: ...4 COMMANDCENTER USER GUIDE...
Страница 22: ...10 COMMANDCENTER USER GUIDE...
Страница 138: ...126 COMMANDCENTER USER GUIDE...
Страница 140: ...128 COMMANDCENTER USER GUIDE...
Страница 144: ...132 COMMANDCENTER USER GUIDE...
Страница 150: ...138 COMMANDCENTER USER GUIDE 255 80 3100...