beautypg.com

HID Cisco ASA and 4TRESS AS User Manual

Page 25

background image

ActivIdentity 4TRESS Authentication Server (FT2011) Web Tokens and Cisco ASA | Integration Handbook

P 25

External Use | July 11, 2012 | © 2012 ActivIdentity

9. Expand the

Attributes section.

10. Select the

Enabled options for the appliance attributes to be mapped to the LDAP attributes.

11. Click

Save. A success message appears.

3.3

Configure Administration Groups, User Types, User Repositories, and Authentication

Policies

For details, refer to the ActivIdentity 4TRESS Authentication Appliance Administration Guide: Management

Console technical documentation. This section summarizes the remaining procedures to perform before Web soft

tokens can be activated.
1. Use the ActivIdentity 4TRESS Management Console to create and update administration groups within user

types. Then you can add users to the administration groups.
User types define categories of users. A hierarchy of administration groups exists for each user type.
For each user type, you can define:

User repositories relating to the user type,

Authentication policies accessible to users of this type, and

User attributes for users of this type.

There are default user types. Installing the ActivIdentity 4TRESS Appliance Server automatically sets up a

number of user types. For each user type, there are pre-defined system users. Collectively, these sample

users have all the required privileges to administer the system. You can use the base data set as provided, or

modify it to meet your specific requirements.

2. Map the user repository to a user type.
3. Assign an authentication policy to a user type.
4. Map the user repository to an administration group.

Administration groups provide a way to organize (partition) users for administrative purposes, as well as a

way to assign permissions to users through membership of administration groups.