Cisco Systems Servers Manuale Utente

Pagina di 654
Chapter 11      Working with User Databases
Token Server User Databases
11-56
Cisco Secure ACS 3.0 for Windows 2000/NT Servers User Guide
78-13751-01, Version 3.0
Step 4
If you are creating a configuration, follow these steps:
a.
Click Create New Configuration.
b.
Type a name for the new configuration for the AXENT token server in the 
box provided, or accept the default name in the box.
c.
Click Submit.
Result: Cisco Secure ACS lists the new configuration in the External User 
Database Configuration table.
Step 5
Click Configure.
Step 6
In the following boxes, type the required information:
Server Name—Name of the defender security server.
Server Address—IP address of the defender security server.
Server Port—Port number of the defender security server.
Communication Timeout—Number of seconds to wait before sending 
notification to the user that the connection has timed out.
Agent ID—Identification of an agent that has been approved by the server.
Agent Key—Agent’s SNK key in hexadecimal numbers (00 to FF).
Step 7
Click Submit.
Result: Cisco Secure ACS saves the AXENT token server database configuration 
you created. You can add it to your Unknown User Policy or assign specific user 
accounts to use this database for authentication. For more information about the 
Unknown User Policy, see the 
For more information about configuring user accounts to authenticate using this 
database, see 
Configuring an RSA SecurID Token Server External User Database
Cisco Secure ACS supports the RSA SecurID token server custom interface for 
authentication of users. You can create only one RSA SecurID configuration 
within Cisco Secure ACS.