Lantronix SLC 16 Lantronix SLC - User Guide - Page 153

Schema Permissions versus Default User Rights, Appendix I: LDAP Schemas

Page 153 highlights

12: User Authentication Typically user authorization (operational rights and device port privileges parameters support only users who exist in the SLC local user database. If an SLC device user gets authenticated via a remote authentication server such as LDAP, configuration of the user is required in the remote authentication server (for authentication only, no authorization) and the SLC console manager (authorization only). With extended support of LDAP active directory user attribute schemas in the SLC device, remote authenticated users get authenticated and authorized from the LDAP server. This provides a single point of user database management by no longer requiring remote authenticated user existence in the SLC local user database. See Appendix I: LDAP Schemas on page 288 for information about installing schema support in the Windows active directory and creating the Lantronix SLC schema attribute. Schema Permissions versus Default User Rights The User Rights shown on the SLC console manager under the LDAP settings are the ones that would be applied to a user logging in if the following are true:  A remote user for a particular username is not configured on the SLC device under the User Authentication-Local/Remote Users page.  An AD user authenticated using LDAP does not have a Schema associated.  Any AD user that has a Schema associated, but only certain rights are assigned.  The checkbox next to Authenticate only remote users who are not in the remote users list: is unchecked under the User Authentication->Local/Remote Users page. Dial-back and Dial-back Number are not supported via the Schema. These features were implemented after LDAP Schema support was added and will be added to the Schema after this release. To configure the SLC console manager to use LDAP to authenticate users: 1. Click the User Authentication tab and select LDAP. Figure 12-6 shows the page that displays. SLC™ Console Manager User Guide 153

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299

12: User Authentication
SLC™ Console Manager User Guide
153
Typically user authorization (operational rights and device port privileges parameters support only
users who exist in the SLC local user database. If an SLC device user gets authenticated via a
remote authentication server such as LDAP, configuration of the user is required in the remote
authentication server (for authentication only, no authorization) and the SLC console manager
(authorization only).
With extended support of LDAP active directory user attribute schemas in the SLC device, remote
authenticated users get authenticated and authorized from the LDAP server. This provides a
single point of user database management by no longer requiring remote authenticated user
existence in the SLC local user database.
See
Appendix I: LDAP Schemas on page 288
for information about installing schema support in
the Windows active directory and creating the Lantronix SLC schema attribute.
Schema Permissions versus Default User Rights
The User Rights shown on the SLC console manager under the LDAP settings are the ones that
would be applied to a user logging in if the following are true:
A remote user for a particular username is not configured on the SLC device under the User
Authentication-Local/Remote Users page.
An AD user authenticated using LDAP does not have a Schema associated.
Any AD user that has a Schema associated, but only certain rights are assigned.
The checkbox next to Authenticate only remote users who are not in the remote users list: is
unchecked under the User Authentication->Local/Remote Users page.
Dial-back and Dial-back Number are not supported via the Schema. These features were
implemented after LDAP Schema support was added and will be added to the Schema after this
release.
To configure the SLC console manager to use LDAP to authenticate users:
1.
Click the
User Authentication
tab and select
LDAP
.
Figure 12-6
shows the page that
displays.