Chapter 2. Trust and Identity
Implementing Identity Management
An important aspect of trust and identity being established in a network involves the ability to authenticate users and devices to a central, trusted repository. Cisco devices will use the TACACS+ plus or RADIUS protocol to authenticate users back to an authentication, authorization, and accounting (AAA) server. A number of AAA servers are on the market, including the Cisco Secure Access Control Server (ACS). The Cisco Secure ACS can be installed on a Microsoft Windows server and provides a central location for network devices to request authentication and authorization and to perform accounting.
AAA is the process of performing authentication, authorization, and accounting for users ...
Get CCSP SNRS Quick Reference Sheets now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.