Cisco 3.3 User Manual

Page 243

Advertising
background image

6-53

User Guide for Cisco Secure ACS for Windows Server

78-16592-01

Chapter 6 User Group Management

Configuration-specific User Group Settings

Configuring Custom RADIUS VSA Settings for a User Group

User-defined, custom Radius VSA configurations appear only when all the
following are true:

You have defined and configured the custom RADIUS VSAs. (For
information about creating user-defined RADIUS VSAs, see

Custom

RADIUS Vendors and VSAs, page 9-28

.)

A network device has been configured in Network Configuration that uses a
RADIUS protocol that supports the custom VSA.

Group-level custom RADIUS attributes have been enabled on the RADIUS
(Name) page of the Interface Configuration section.

You must configure both the IETF RADIUS and the custom RADIUS attributes.

To configure and enable custom RADIUS attributes to be applied as an
authorization for each user in the current group, follow these steps:

Step 1

Confirm that your IETF RADIUS attributes are configured properly.

For more information about setting IETF RADIUS attributes, see

Configuring

IETF RADIUS Settings for a User Group, page 6-38

.

Step 2

In the navigation bar, click Group Setup.

The Group Setup Select page opens.

Step 3

From the Group list, select a group, and then click Edit Settings.

The Group Settings page displays the name of the group at its top.

Step 4

From the Jump To list at the top of the page, choose RADIUS (custom name).

Step 5

In the RADIUS (custom name) Attributes table, specify the attributes to be
authorized for the group by selecting the check box next to the attribute. Where
applicable, further define the authorization for that attribute in the field next to it.
For more information about attributes, see

Appendix C, “RADIUS Attributes”

, or

the documentation for network devices using RADIUS.

Note

The MS-CHAP-MPPE-Keys attribute value is autogenerated by
Cisco Secure ACS; there is no value to set in the HTML interface.

Advertising