HP StorageWorks MSA 2/8 HP StorageWorks Fabric OS 3.X Document Addendum (AA-RW - Page 138

Accounting Support, Setting Up the RADIUS Server, Windows 2000, Start

Page 138 highlights

Fabric OS procedures user guide ■ API. The following items apply: - When an older version of the API host library authenticates against a switch with RADIUS support, the host performs the login. However, the old host library does not recognize the role returned from the switch, which can result in the host displaying an incorrect read or write attribute for an account. The switch library performs the permission check again for individual API function calls. - API provides functions for RADIUS configuration that share the behavior of the aaaconfig CLI command. ■ Advanced Web Tools and API. The following items apply to both of these features: - Users can log in using account names and passwords configured on the RADIUS server, and gain access with the switch roles defined on the RADIUS server. - Users can log in through API using account names and passwords configured on the RADIUS server, and gain access with the switch roles defined on the RADIUS server. - When a proxy switch is used, the switch-side component performs authentication on the proxy switch, rather than on the destination switch. Therefore, to use RADIUS in this environment, you must configure on the proxy switch. Accounting Support The RADIUS service supports accounting request and response packets so that accounting records can be centralized on the RADIUS server. The login account name, assigned role, and password are stored on the RADIUS server for each user. Setting Up the RADIUS Server You must know the switch IP address or name to connect to switches. Use the ipaddrshow command to display a switch IP address. User accounts should be set up by their true network-wide identity, rather than by the account names created on a Fabric OS switch. Along with each account name, the administrator should assign appropriate switch access roles. To manage a nonsecure fabric, these roles can be user or admin. To manage a secure fabric, these roles can be user, admin, or nonfcsadmin. When they log in to a switch configured with RADIUS, users enter their assigned RADIUS account names and passwords at the prompt. After the RADIUS server authenticates a user, it responds with the assigned switch role in an HP Vendor-Specific Attribute (VSA) as defined in the RFC. An authentication-accept response without such VSA role assignment grants the user role. The following sections explain how to configure a RADIUS server to support HP clients under different operating systems. Windows 2000 Use these procedures to add a client to the RADIUS server and create remote access policies for Fabric OS user and admin roles. To add a RADIUS client: 1. From the Windows Start menu, select Programs > Administrative Tools:Internet Authentication Service. 2. In the Internet Authentication Service window, right-click the RADIUS Clients folder and select New RADIUS Client. 138 Fabric OS 3.x Document Addendum

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250

Fabric OS procedures user guide
138
Fabric OS 3.x Document Addendum
API. The following items apply:
When an older version of the API host library authenticates against a switch with
RADIUS support, the host performs the login. However, the old host library does not
recognize the role returned from the switch, which can result in the host displaying an
incorrect read or write attribute for an account. The switch library performs the
permission check again for individual API function calls.
API provides functions for RADIUS configuration that share the behavior of the
aaaconfig
CLI command.
Advanced Web Tools
and
API. The following items apply to both of these features:
Users can log in using account names and passwords configured on the RADIUS
server, and gain access with the switch roles defined on the RADIUS server.
Users can log in through API using account names and passwords configured on the
RADIUS server, and gain access with the switch roles defined on the RADIUS server.
When a proxy switch is used, the switch-side component performs authentication on
the proxy switch, rather than on the destination switch. Therefore, to use RADIUS in
this environment, you must configure on the proxy switch.
Accounting Support
The RADIUS service supports accounting request and response packets so that accounting
records can be centralized on the RADIUS server. The login account name, assigned role, and
password are stored on the RADIUS server for each user.
Setting Up the RADIUS Server
You must know the switch IP address or name to connect to switches. Use the
ipaddrshow
command to display a switch IP address.
User accounts should be set up by their true network-wide identity, rather than by the account
names created on a Fabric OS switch. Along with each account name, the administrator should
assign appropriate switch access roles. To manage a nonsecure fabric, these roles can be user
or admin. To manage a secure fabric, these roles can be user, admin, or nonfcsadmin.
When they log in to a switch configured with RADIUS, users enter their assigned RADIUS
account names and passwords at the prompt. After the RADIUS server authenticates a user, it
responds with the assigned switch role in an HP Vendor-Specific Attribute (VSA) as defined in
the RFC. An authentication-accept response without such VSA role assignment grants the user
role.
The following sections explain how to configure a RADIUS server to support HP clients under
different operating systems.
Windows 2000
Use these procedures to add a client to the RADIUS server and create remote access policies
for Fabric OS user and admin roles.
To add a RADIUS client:
1.
From the Windows
Start
menu, select
Programs > Administrative Tools:Internet
Authentication Service
.
2.
In the Internet Authentication Service window, right-click the
RADIUS Clients
folder and
select
New RADIUS Client
.