EasyManuals Logo

Cisco Servers User Manual

Cisco Servers
654 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #437 background imageLoading...
Page #437 background image
11-47
Cisco Secure ACS 3.0 for Windows 2000/NT Servers User Guide
78-13751-01, Version 3.0
Chapter 11 Working with User Databases
Token Server User Databases
RetriesThe number of authentication attempts Cisco Secure ACS makes
before failing over to the secondary proxy RADIUS server.
Failback Retry Delay (minutes)The number of minutes after which
Cisco Secure ACS attempts authentications using a failed primary proxy
RADIUS server.
Note If both the primary and the secondary servers fail,
Cisco Secure ACS alternates between both servers until one
responds.
Step 8 Click Submit.
Result: Cisco Secure ACS saves the proxy RADIUS token server database
configuration you created. You can add it to your Unknown User Policy or assign
specific user accounts to use this database for authentication. For more
information about the Unknown User Policy, see the Unknown User Processing
section on page 12-1. For more information about configuring user accounts to
authenticate using this database, see Chapter 7, Setting Up and Managing User
Accounts.
Token Server User Databases
Cisco Secure ACS supports the use of token servers for the increased security
provided by one-time passwords (OTPs). This section includes the following
topics:
About Token Servers and Cisco Secure ACS, page 11-48
About Token Servers and Cisco Secure ACS, page 11-48
RADIUS-Enabled Token Servers, page 11-49
Token Servers with Vendor-Proprietary Interfaces, page 11-53

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Servers and is the answer not in the manual?

Cisco Servers Specifications

General IconGeneral
BrandCisco
ModelServers
CategorySoftware
LanguageEnglish

Related product manuals