HP BladeSystem bc2800 Embedded Web System User Guide for the HP BladeSystem PC - Page 33

Management, Security > Authentication > Authentication Profiles, Profile Name, Methods, Local

Page 33 highlights

Configuring Device Security To define authentication profiles: 1. Click Management Security > Authentication > Authentication Profiles. The Authentication Profiles page opens. : Authentication Profiles The Authentication Profiles page contains the following sections: ❏ The Login Authentication Profiles section allows network administrators to select the authentication method by which system users are logged onto the device. ❏ The Enable Authentication Profiles section allows network administrators to select the method by which users are enabled on the system. Each section on the Authentication Profiles page contains the following fields: ❏ Profile Name - Contains a list of user-defined authentication profile lists to which user-defined authentication profiles are added. ❏ Methods - Defines the user authentication methods. The possible field values are: ◆ None - Assigns no authentication method to the authentication profile. ◆ Local - Authenticates the user at the device level. The device checks the user name and password for authentication. ◆ RADIUS - Authenticates the user at the RADIUS server. For more information, see "Defining RADIUS Settings." ◆ TACACS+ - Authenticates the user at the TACACS+ server. For more information, see "Defining TACACS+ Authentication." ◆ Line - Authenticates the user using a line password. ◆ Enable - Authenticates the user using an enable password. Embedded Web System User Guide www.hp.com 4-7

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216

Embedded Web System User Guide
www.hp.com
4-7
Configuring Device Security
To define authentication profiles:
1. Click
Management
Security > Authentication > Authentication Profiles
. The
Authentication Profiles page opens.
:
Authentication Profiles
The Authentication Profiles page contains the following sections:
The Login Authentication Profiles section allows network administrators to select the
authentication method by which system users are logged onto the device.
The Enable Authentication Profiles section allows network administrators to select the
method by which users are enabled on the system.
Each section on the Authentication Profiles page contains the following fields:
Profile Name
— Contains a list of user-defined authentication profile lists to which
user-defined authentication profiles are added.
Methods
— Defines the user authentication methods. The possible field values are:
None
— Assigns no authentication method to the authentication profile.
Local
— Authenticates the user at the device level. The device checks the user name
and password for authentication.
RADIUS
— Authenticates the user at the RADIUS server. For more information,
see “Defining RADIUS Settings.”
TACACS+
— Authenticates the user at the TACACS+ server. For more information,
see “Defining TACACS+ Authentication.”
Line
— Authenticates the user using a line password.
Enable
— Authenticates the user using an enable password.