HP BladeSystem bc2800 Embedded Web System User Guide for the HP BladeSystem PC - Page 35

Mapping Authentication Methods

Page 35 highlights

Configuring Device Security Mapping Authentication Methods After authentication profiles are defined, they can be applied to management access methods. For example, console users can be authenticated by Authentication Profile List 1, while Telnet users are authenticated by Authentication Method List 2. Authentication methods are selected by using arrows to move the methods to the Selected Methods list. The order in which the methods are selected is the order by which the authentication methods are used. To map authentication methods: 1. Click Management Security > Authentication > Authentication Mapping. The Authentication Mapping page opens: Authentication Mapping The Authentication Mapping page contains the following fields: ❏ Console - Indicates that authentication profiles are used to authenticate console users. ❏ Telnet - Indicates that authentication profiles are used to authenticate Telnet users. ❏ Secure Telnet (SSH) - Indicates that authentication profiles are used to authenticate Secure Shell (SSH) users. SSH provides clients secure and encrypted remote connections to a device. ❏ Secure HTTP - Indicates that authentication methods are used for Secure HTTP access. Possible field values are: ◆ None - Indicates that no authentication method is used for access. ◆ Local - Indicates that authentication occurs locally. ◆ RADIUS - Indicates that authentication occurs at the RADIUS server. ◆ Line - Indicates that authentication uses a line password. ◆ Enable - Indicates that authentication uses an enable password. Embedded Web System User Guide www.hp.com 4-9

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216

Embedded Web System User Guide
www.hp.com
4-9
Configuring Device Security
Mapping Authentication Methods
After authentication profiles are defined, they
can be applied to management access
methods. For
example, console users can be authenticated by Authentication Profile List 1, while Telnet users
are authenticated by Authentication Method List 2.
Authentication methods are selected by using arrows to move the methods to the Selected
Methods list. The order in which the methods are selected is the order by which the
authentication methods are used.
To map authentication methods:
1. Click
Management Security > Authentication > Authentication Mapping
. The
Authentication Mapping page opens:
Authentication Mapping
The Authentication Mapping page contains the following fields:
Console
— Indicates that authentication profiles are used to authenticate console users.
Telnet
— Indicates that authentication profiles are used to authenticate Telnet users.
Secure Telnet (SSH)
— Indicates that authentication profiles are used to authenticate
Secure Shell (SSH) users. SSH provides clients secure and encrypted remote
connections to a device.
Secure HTTP
— Indicates that authentication methods are used for Secure HTTP
access. Possible field values are:
None
— Indicates that no authentication method is used for access.
Local
— Indicates that authentication occurs locally.
RADIUS
— Indicates that authentication occurs at the RADIUS server.
Line
— Indicates that authentication uses a line password.
Enable
— Indicates that authentication uses an enable password.