Step 1 |
Click the
System
Configuration icon and choose
Authentication.
This launches
Cisco
UCS Central Authentication Manage dialog box.
|
Step 2 |
In
LDAP, supply the information requested in these
tabs.
-
On the
Basic tab, type values for the
Database Connection Timeout,
Filter,
Attribute, and
Base
DN.
-
On the
Providers tab, click
+ to add a provider, and complete the necessary
information in the
Basic and
Group Rules tabs.
Select Enabled or Disabled in the SSL section. If you select Enabled, encryption is required for communications with the LDAP database. Enabling SSL LDAP uses STARTTLS which allows encrypted
communication using port 389. If you check Disabled, authentication information will be sent as clear text.
-
On the
Groups tab, click
+ to add a provider group, and optionally associate
it with a provider.
-
The
maximum number of LDAP provider groups supported for
Cisco UCS Central
is 16.
-
The
maximum providers supported in
Cisco UCS Central,
for one provider group, is 8.
-
On the
Group Maps tab, enter a
Provider Group Map DN, and then optionally add
Roles and
Locales.
The maximum
group map length cannot exceed more than 240 characters in
Cisco UCS Central.
For example:
maximum group-map length:
---------------------------------
CN=jeewan2,\
OU=1-2-3-4-5-6-7-8-9-10-11-12-13-14-15-16-17-18-19-20-21-22-\
23-24-1,\
OU=1-2-3-4-5-6-7-8-9-10-11-12-13-14-15-16-17-18-19-20-21-22-\
23-24-0,\
OU=ou-01-11-1,\
DC=ucsm,DC=qasam-lab,DC=in
|
Step 3 |
In
TACACS+, complete the following sections as
required:
-
On the
Basic tab, type values for the
Database Connection Timeout and
Retry Count.
-
On the
Providers tab, click
+ to add a provider, and complete the necessary
configuration information.
You can
use the up and down arrows to change the order of the providers.
-
On the
Groups tab, click
+ to add a provider group, and optionally associate
it with a provider.
|
Step 4 |
In
RADIUS, complete the following sections as required:
-
On the
Basic tab, type values for the
Database Connection Timeout and
Retry Count.
-
On the
Providers tab, click
+ to add a provider, and complete the necessary
configuration information.
You can
use the up and down arrows to change the order of the providers.
-
On the
Groups tab, click
+ to add a provider group, and optionally associate
it with a provider.
|
Step 5 |
In
Authentication Domains, configure, add, or delete
Native or Console default domains.
The maximum
number of Authentication Domains supported in
Cisco UCS Central
is 8.
|
Step 6 |
Click
Native
(Default):
-
Select the
Default Behavior for Remote Users.
-
In
Web
Session Refresh Period (Seconds), enter the maximum amount of time
allowed between refresh requests for a user accessing a
Cisco UCS domain.
If the
session exceeds the time limit,
Cisco UCS Central
changes the web session to inactive, but it does not terminate the session.
Specify
between 60 and 172800 seconds. The default is 600 seconds.
-
In
Web
Session Timeout (Seconds), enter the maximum amount of time that
can elapse after the last refresh request. If the web session exceeds time
limit,
Cisco UCS Central
automatically terminates the web session.
Specify
between 60 and 172800 seconds. The default is 7200 seconds.
-
Choose
Enable or
Disable for
Authentication.
-
If you
selected
Enabled, select an
Authentication Realm:
-
LDAP—Define users on the LDAP server specified in
Cisco UCS Central.
-
Local—Define users locally in
Cisco UCS Central
or the
Cisco UCS domain.
-
RADIUS—Define users on the RADIUS server specified
in Cisco UCS Central.
-
TACACS+—Define users on the TACACS+ server specified
in Cisco UCS Central.
-
If you
selected
LDAP,
RADIUS, or
TACACS+, you can select an associated provider group
from theProvider
Group.
|
Step 7 |
Click
Console (Default):
-
Choose to
enable or disable
Authentication.
-
If you
selected
Enabled, select an
Authentication Realm.
-
If you
selected
LDAP,
RADIUS, or
TACACS+, you can select an associated provider group
from the
Provider Group.
|
Step 8 |
Click
+ to add a new authentication domain.
-
Enter the
name of the authentication domain.
This name
can be between 1 and 16 alphanumeric characters. You cannot use spaces or any
special characters other than - (hyphen), _ (underscore), : (colon), and .
(period). You cannot change this name once you save it.
For systems using LDAP, TACACS, and RADIUS, the authentication domain name counts toward the 32 character limit for locally
created usernames. Because Cisco UCS reserves five characters for formatting, you are not allowed to have a combined total of more than 27 characters for the
domain name and username.
-
Enter the
Web Session Refresh Period (Seconds).
-
Enter the
Web Session Timeout (Seconds).
-
If the
Authentication Realm is set to
LDAP,
RADIUS, or
TACACS+, select a
Provider Group.
|
Step 9 |
Click
Save.
After
creating an authentication domain, you can edit the configuration or remove it.
|