Encryption, Authentication, Choosing among authentication methods – Cyclades User's Guide User Manual

Page 61: Encryption authentication

Advertising
background image

Introduction

45

Security

In this situation the system detects the pre-defined security profile. You
can continue working in the Web Manager.

See “Step 1: Security Profile [Wizard]” on page 143 for detailed information
on security profiles and configuration procedures

Encryption

Administrators can specify that communications are encrypted between the
KVM/net and any computer attached to a KVM port. In the Web Manager, the
administrator chooses Expert>Configuration>KVM>IP Users to bring up the
IP security form.

See “Local Users and IP Users” on page 176 for instructions.

Authentication

Anyone accessing the KVM/net must log in by entering a username and
password. Controlling access by requiring users to enter names and passwords
is called authentication. Usernames and passwords entered during login
attempts are checked against a database that lists all the valid usernames along
with the encrypted passwords. Access is denied if the username or password is
not valid. The password database that is used for checking can reside either
locally (on the KVM/net) or on an authentication server on the network. The
selected authentication server must be already installed and configured in
order for authentication to work. Using one or more of the many types of
popular authentication methods supported on the KVM/net can reduce
administrator workload when a user account needs to be added, modified, or
deleted.

Choosing Among Authentication Methods

The administrator can select among authentication methods to control logins
to the following components:

For logins to the KVM/net

The authentication method chosen for the KVM/net is used for subsequent
access through Telnet, SSH, or the Web Manager.

For logins to all KVM ports

Advertising