Chapter 7: User Management123Authentication SettingsAuthentication is the process of verifying that a user is who he says heis. Once a user is authenticated, the user's group is used to determinehis system and port permissions. The user's assigned privilegesdetermine what type of access is allowed. This is called authorization.When the KSX II is configured for remote authentication, the externalauthentication server is used primarily for the purposes of authentication,not authorization.From the Authentication Settings page you can configure the type ofauthentication used for access to your KSX II.Note: When remote authentication (LDAP/LDAPS or RADIUS) isselected, if the user is not found, the local authentication database willalso be checked.To configure authentication:1. Choose User Management > Authentication Settings. TheAuthentication Settings page opens.2. Choose the option for the authentication protocol you want to use(Local Authentication, LDAP/LDAPS, or RADIUS). Choosing theLDAP option enables the remaining LDAP fields; selecting theRADIUS option enables the remaining RADIUS fields.3. If you choose Local Authentication, proceed to step 6.4. If you choose LDAP/LDAPS, read the section entitled ImplementingLDAP Remote Authentication (see "Implementing LDAP/LDAPSRemote Authentication" on page 124) for information aboutcompleting the fields in the LDAP section of the AuthenticationSettings page.5. If you choose RADIUS, read the section entitled ImplementingRADIUS Remote Authentication (on page 128) for informationabout completing the fields in the RADIUS section of theAuthentication Settings page.6. Click OK to save.To return to factory defaults: Click the Reset to Defaults button.