Cisco Cisco Web Security Appliance S370 Guia Do Utilizador
21-9
AsyncOS 8.5 for Cisco Web Security Appliances User Guide
Chapter 21 Perform System Administration Tasks
Administering User Accounts
Step 6
(Optional) Click Add Row to add another RADIUS server. Repeat steps
for each RADIUS server.
Note
You can add up to ten RADIUS servers.
Step 7
Enter the number of seconds AsyncOS stores the external authentication credentials before contacting
the RADIUS server again to re-authenticate in the “External Authentication Cache Timeout” field.
Default is zero (0).
the RADIUS server again to re-authenticate in the “External Authentication Cache Timeout” field.
Default is zero (0).
Note
If the RADIUS server uses one-time passwords, for example passwords created from a token,
enter zero (0). When the value is set to zero, AsyncOS does not contact the RADIUS server again
to authenticate during the current session.
enter zero (0). When the value is set to zero, AsyncOS does not contact the RADIUS server again
to authenticate during the current session.
Step 8
Configure Group Mapping:
Step 9
Choose whether to map all externally authenticated users to the Administrator role or to different
appliance user role types.
appliance user role types.
Step 10
If you map users to different role types, enter the group name as defined in the RADIUS CLASS attribute
in the Group Name or Directory field, and choose an appliance role type from the Role field. You can
add more role mappings by clicking Add Row.
in the Group Name or Directory field, and choose an appliance role type from the Role field. You can
add more role mappings by clicking Add Row.
Setting
Description
Map externally authenticated
users to multiple local roles.
users to multiple local roles.
AsyncOS assigns RADIUS users to appliance roles based on the
RADIUS CLASS attribute. CLASS attribute requirements:
RADIUS CLASS attribute. CLASS attribute requirements:
•
3 character minimum
•
253 character maximum
•
no colons, commas, or newline characters
•
one or more mapped CLASS attributes for each RADIUS user
(With this setting, AsyncOS denies access to RADIUS users
without a mapped CLASS attribute.)
(With this setting, AsyncOS denies access to RADIUS users
without a mapped CLASS attribute.)
For RADIUS users with multiple CLASS attributes, AsyncOS
assigns the most restrictive role. For example, if a RADIUS user
has two CLASS attributes, which are mapped to the Operator and
Read-Only Operator roles, AsyncOS assigns the RADIUS user to
the Read-Only Operator role, which is more restrictive than the
Operator role.
assigns the most restrictive role. For example, if a RADIUS user
has two CLASS attributes, which are mapped to the Operator and
Read-Only Operator roles, AsyncOS assigns the RADIUS user to
the Read-Only Operator role, which is more restrictive than the
Operator role.
These are the appliance roles ordered from least restrictive to most
restrictive:
restrictive:
•
Administrator
•
Operator
•
Read-Only Operator
•
Guest
Map all externally authenticated
users to the Administrator role.
users to the Administrator role.
AsyncOS assigns RADIUS users to the Administrator role.