beautypg.com
viii
Adding an LDAP server······································································································································· 350
Testing connectivity to an LDAP server ·············································································································· 354
Modifying LDAP server settings ·························································································································· 354
Deleting an LDAP server ····································································································································· 355
Importing certificates ··········································································································································· 356
Batch-modifying LDAP server admin passwords ······························································································ 356
Synchronizing user groups ································································································································· 357
Managing LDAP synchronization policies ················································································································· 357
Accessing the LDAP synchronization policy list page ····················································································· 357
Querying LDAP synchronization policies ·········································································································· 358
Viewing LDAP synchronization policy details ·································································································· 359
Adding an LDAP synchronization policy ·········································································································· 363
Modifying an LDAP synchronization policy ····································································································· 374
Deleting an LDAP synchronization policy ········································································································· 385
Manually executing a synchronization policy ·································································································· 385
Managing users bound to an LDAP synchronization policy ··········································································· 385
Validating on-demand synchronization policies ······························································································ 386
Managing LDAP users ················································································································································· 386
Viewing LDAP users ············································································································································ 386
Querying LDAP users ·········································································································································· 388
Viewing LDAP user details ·································································································································· 388
Binding common users with LDAP synchronization policies ··········································································· 392
Unbinding LDAP users with an LDAP synchronization policy ········································································· 392
Synchronizing LDAP users ·································································································································· 393
Modifying LDAP user information ······················································································································ 393
Deleting LDAP users ············································································································································ 396
Adding an LDAP user to the blacklist ················································································································ 396
Releasing an LDAP user from the blacklist ········································································································ 397
Applying for services for LDAP users ················································································································· 397
Cancelling services for LDAP users ···················································································································· 397
Exporting LDAP users ·········································································································································· 398
Batch LDAP User Operations ····························································································································· 399
Supplementary information for LDAP user passwords stored in UAM··························································· 399
19 Configuring certificate authentication ·············································································································· 400
Implementing local certificate authentication for 802.1X or portal users ····················································· 400
Managing root certificate, server certificate, and CRL in UAM ·············································································· 403
Verifying the certificates ····································································································································· 403
Importing root and server certificates to UAM ································································································· 404
Accessing the Certification Configuration List page ························································································ 405
Configuring CRL update ····································································································································· 406
Updating the CRL at the URL ······························································································································ 406
Importing a CRL file ············································································································································· 406
Deleting certificate configuration ······················································································································· 407
Enabling certificate authentication in an access policy ··························································································· 407
20 Configuring RSA authentication ······················································································································· 409
Enabling RSA authentication in an access policy ····································································································· 410
Configuring RSA authentication ································································································································· 410
Accessing the RSA authentication configuration list page ·············································································· 410
Adding an RSA authentication item ·················································································································· 411
Modifying an RSA authentication item ············································································································· 411
Deleting an RSA authentication item ················································································································· 411
21 Configuring roaming authentication ················································································································ 412
Roaming authentication example ······················································································································ 412