Chapter 11. System Configuration

This chapter deals with the configuration of Access Control Server (ACS) to facilitate authentication to external databases, as well as the backup and restoration of ACS. In particular, the chapter covers the following:

  • External database configuration

  • Database group mappings

  • Unknown user policy

  • Database replication and backup

  • Synchronization

The following sections discuss each of these topics in further detail.

How Users Interact with Your External Database Configuration

Different types of users exist ...

Get Cisco Access Control Security: AAA Administrative Services now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.