HID Palo Alto Networks and ActivID AS User Manual
Page 23

ActivID Appliance RADIUS and Palo Alto Networks Integration | RADIUS Channel Integration Handbook
External Release | © 2014 HID Global Corporation/ASSA ABLOY AB. All rights reserved.
Page | 23
8. In the Configure connection login credentials section of the page, enter the user credentials that the
appliance will use to access the LDAP database. Then enter and confirm the user’s Password. You MUST
indicate the full User DN.
9. Expand the Attributes section.
10. Select the Enabled options for the appliance attributes to be mapped to the LDAP attributes.
11. Click Save. A success message appears.
3.3
Configure Administration Groups, User Types, User Repositories, and Authentication
Policies
For details, refer to the ActivID Appliance Management Console Admin Guide technical documentation. This
section summarizes the remaining procedures to perform before Tokens can be activated.
1. Use the ActivID Management Console to create and update administration groups within user types. Then
you can add users to the administration groups.
User types define categories of users. A hierarchy of administration groups exists for each user type.
For each user type, you can define:
a. User repositories relating to the user type,
b. Authentication policies accessible to users of this type, and
c. User attributes for users of this type.
There are default user types. Installing the ActivID Appliance Server automatically sets up a number of user
types. For each user type, there are pre-defined system users. Collectively, these sample users have all the
required privileges to administer the system. You can use the base data set as provided, or modify it to meet
your specific requirements.
2. Map the user repository to a user type.
3. Assign an authentication policy to a user type.
4. Map the user repository to an administration group.
Administration groups provide a way to organize (partition) users for administrative purposes, as well as a
way to assign permissions to users through membership of administration groups.