beautypg.com

Features, Rsa authentication, Application scenarios – H3C Technologies H3C Intelligent Management Center User Manual

Page 27

background image

9

Figure 6 Network diagram of LDAP authentication

Features

LDAP authentication has the following features:

After UAM receives an authentication request from an endpoint user, UAM forwards the request to
the LDAP server by using the LDAP protocol. The LDAP server authenticates the user identity.

After the user passes identify authentication, UAM checks the binding information. If the user passes
the check, UAM informs the access device to permit network access and assigns the access control

policies to the access device. The access device then controls user access to the network according
to the policies.

RSA authentication

Application scenarios

RSA authentication, shown in

Figure 7

, is used for applications (for example, bank systems) that use

dynamic passwords for security. UAM does not support dynamic passwords. Because of this, a RADIUS

server that supports dynamic passwords (such as an RSA server) must be deployed.