Lantronix SLC 32 Lantronix SLC - User Guide - Page 157

User Attributes and Permissions from LDAP Schema, LDAP Commands, RADIUS

Page 157 highlights

12: User Authentication User Attributes and Permissions from LDAP Schema Remote user attributes (group/permissions and port access) can be obtained from an Active Directory server schema via the user attribute secureLinxSLCPerms. This attribute is a set of parameter-value pairs. Each parameter and value is separated by a space, and a space separates each parameter-value pair. White space is not supported in the value strings. See Chapter 9: PC Cards for the parameters and values. LDAP Commands The following CLI commands correspond to the LDAP page. For more information, see Chapter 15: Command Reference .  set ldap (on page 234)  show ldap (on page 235) RADIUS The system administrator can configure the SLC console manager to use RADIUS to authenticate users attempting to log in using the Web, Telnet, SSH, or the console port. Users who are authenticated through RADIUS are granted device port access through the port permissions on this page. All RADIUS users are members of a group that has predefined user rights associated with it. You can add additional user rights that are not defined by the group. To configure the SLC console manager to use RADIUS to authenticate users: 1. Click the User Authentication tab and select RADIUS. Figure 12-7 shows the page that displays. SLC™ Console Manager User Guide 157

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299

12: User Authentication
SLC™ Console Manager User Guide
157
User Attributes and Permissions from LDAP Schema
Remote user attributes (group/permissions and port access) can be obtained from an Active
Directory server schema via the user attribute
secureLinxSLCPerms
. This attribute is a set of
parameter-value pairs. Each parameter and value is separated by a space, and a space separates
each parameter-value pair. White space is not supported in the value strings. See
Chapter 9: PC
Cards
for the parameters and values.
LDAP Commands
The following CLI commands correspond to the
LDAP
page. For more information, see
Chapter
15: Command Reference
.
set ldap (on page 234)
show ldap (on page 235)
RADIUS
The system administrator can configure the SLC console manager to use RADIUS to authenticate
users attempting to log in using the Web, Telnet, SSH, or the console port.
Users who are authenticated through RADIUS are granted device port access through the port
permissions on this page.
All RADIUS users are members of a group that has predefined user rights associated with it. You
can add additional user rights that are not defined by the group.
To configure the SLC console manager to use RADIUS to authenticate users:
1.
Click the
User Authentication
tab and select
RADIUS
.
Figure 12-7
shows the page that
displays.