HID Cisco ASA and 4TRESS AS User Manual
Page 25

ActivIdentity 4TRESS Authentication Server (FT2011) Web Tokens and Cisco ASA | Integration Handbook
P 25
External Use | July 11, 2012 | © 2012 ActivIdentity
9. Expand the
Attributes section.
10. Select the
Enabled options for the appliance attributes to be mapped to the LDAP attributes.
11. Click
Save. A success message appears.
3.3
Configure Administration Groups, User Types, User Repositories, and Authentication
Policies
For details, refer to the ActivIdentity 4TRESS Authentication Appliance Administration Guide: Management
Console technical documentation. This section summarizes the remaining procedures to perform before Web soft
tokens can be activated.
1. Use the ActivIdentity 4TRESS Management Console to create and update administration groups within user
types. Then you can add users to the administration groups.
User types define categories of users. A hierarchy of administration groups exists for each user type.
For each user type, you can define:
•
User repositories relating to the user type,
•
Authentication policies accessible to users of this type, and
•
User attributes for users of this type.
There are default user types. Installing the ActivIdentity 4TRESS Appliance Server automatically sets up a
number of user types. For each user type, there are pre-defined system users. Collectively, these sample
users have all the required privileges to administer the system. You can use the base data set as provided, or
modify it to meet your specific requirements.
2. Map the user repository to a user type.
3. Assign an authentication policy to a user type.
4. Map the user repository to an administration group.
Administration groups provide a way to organize (partition) users for administrative purposes, as well as a
way to assign permissions to users through membership of administration groups.