Chapter 2. Trust and Identity
Implementing Identity Management
An important aspect of trust and identity being established in a network involves the ability to authenticate users and devices to a central, trusted repository. Cisco devices will use the TACACS+ plus or RADIUS protocol to authenticate users back to an authentication, authorization, and accounting (AAA) server. A number of AAA servers are on the market, including the Cisco Secure Access Control Server (ACS). The Cisco Secure ACS can be installed on a Microsoft Windows server and provides a central location for network devices to request authentication and authorization and to perform accounting.
AAA is the process of performing authentication, authorization, and accounting for users ...