Dell PowerConnect W Clearpass 100 Software External Authentication Servers Sof - Page 3

Table of Contents

Page 3 highlights

Table of Contents External Authentication Servers ...4 About RADIUS Authentication Servers ...4 Types of authentication server...4 Authorization for external authentication servers 4 Configuring RADIUS Authentication ...5 Joining an Active Directory domain ...5 Authenticating Active Directory users ...8 Leaving an Active Directory domain ...9 Managing Authentication Servers ...10 Authorization for External Authentication Servers 11 Advanced authorization - Example 1 ...12 Advanced authorization - Example 2 ...12 Amigopod |Technical Note External Authentication Servers |3

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13

Amigopod
|Technical Note
External Authentication Servers
|
3
Table of Contents
External Authentication Servers
....................................................................................................................
4
About RADIUS Authentication Servers
........................................................................................................
4
Types of authentication server
..................................................................................................................
4
Authorization for external authentication servers
......................................................................................
4
Configuring RADIUS Authentication
............................................................................................................
5
Joining an Active Directory domain
.............................................................................................................
5
Authenticating Active Directory users
..........................................................................................................
8
Leaving an Active Directory domain
............................................................................................................
9
Managing Authentication Servers
..............................................................................................................
10
Authorization for External Authentication Servers
......................................................................................
11
Advanced authorization — Example 1
....................................................................................................
12
Advanced authorization — Example 2
....................................................................................................
12