Cisco Cisco Content Security Management Appliance M160 사용자 가이드
C H A P T E R
10-1
Cisco IronPort AsyncOS 8.0 for Security Management User Guide
10
Integrating with LDAP
•
•
•
•
•
•
•
•
Overview
If you maintain end-user passwords and email aliases in a corporate LDAP directory — for example, in
Microsoft Active Directory, SunONE Directory Server, or OpenLDAP directories — you can use the
LDAP directory to authenticate the following users:
Microsoft Active Directory, SunONE Directory Server, or OpenLDAP directories — you can use the
LDAP directory to authenticate the following users:
•
End users and administrative users who access the Cisco IronPort Spam Quarantine.
When a user logs in to the web UI for the Cisco IronPort Spam Quarantine, the LDAP server
validates the login name and password, and AsyncOS retrieves a list of the corresponding email
aliases. Quarantined messages sent to any of the user's email aliases can appear in the Cisco IronPort
Spam Quarantine, as long as the appliance does not rewrite them.
validates the login name and password, and AsyncOS retrieves a list of the corresponding email
aliases. Quarantined messages sent to any of the user's email aliases can appear in the Cisco IronPort
Spam Quarantine, as long as the appliance does not rewrite them.
See
•
Administrative users who sign in to the Security Management appliance when External
Authentication is enabled and configured.
Authentication is enabled and configured.
See
.
Configuring LDAP to Work with the Cisco IronPort Spam
Quarantine
Quarantine
When you configure your Cisco IronPort appliance to work with an LDAP directory, you must complete
the following steps to set up for acceptance, routing, aliasing, and masquerading:
the following steps to set up for acceptance, routing, aliasing, and masquerading: