Cisco Cisco Content Security Management Appliance M160 사용자 가이드
C H A P T E R
11-1
AsyncOS 8.1 for Cisco Content Security Management User Guide
11
Integrating with LDAP
•
•
•
•
•
•
•
•
Overview
If you maintain end-user passwords and email aliases in a corporate LDAP directory — for example, in
Microsoft Active Directory, SunONE Directory Server, or OpenLDAP directories — you can use the
LDAP directory to authenticate the following users:
Microsoft Active Directory, SunONE Directory Server, or OpenLDAP directories — you can use the
LDAP directory to authenticate the following users:
•
End users and administrative users who access the Cisco IronPort Spam Quarantine.
When a user logs in to the web UI for the Cisco IronPort Spam Quarantine, the LDAP server
validates the login name and password, and AsyncOS retrieves a list of the corresponding email
aliases. Quarantined messages sent to any of the user's email aliases can appear in the Cisco IronPort
Spam Quarantine, as long as the appliance does not rewrite them.
validates the login name and password, and AsyncOS retrieves a list of the corresponding email
aliases. Quarantined messages sent to any of the user's email aliases can appear in the Cisco IronPort
Spam Quarantine, as long as the appliance does not rewrite them.
See
•
Administrative users who sign in to the Cisco Content Security Management appliance when
External Authentication is enabled and configured.
External Authentication is enabled and configured.
See
.
Configuring LDAP to Work with the Cisco IronPort Spam
Quarantine
Quarantine
When you configure your Cisco Content Security appliance to work with an LDAP directory, you must
complete the following steps to set up for acceptance, routing, aliasing, and masquerading:
complete the following steps to set up for acceptance, routing, aliasing, and masquerading: