Chapter 7: User Management122Authentication SettingsAuthentication is the process of verifying that a user is who he says heis. Once a user is authenticated, the user's group is used to determinehis system and port permissions. The user's assigned privilegesdetermine what type of access is allowed. This is called authorization.When the KX II is configured for remote authentication, the externalauthentication server is used primarily for the purposes of authentication,not authorization.If you are using a tiered configuration in which a base KX II device isused to access multiple other tiered devices, the base device and thetiered devices must using the same authentication settings.From the Authentication Settings page you can configure the type ofauthentication used for access to your KX II.Note: When remote authentication (LDAP/LDAPS or RADIUS) isselected, if the user is not found, the local authentication database willalso be checked.To configure authentication:1. Choose User Management > Authentication Settings. TheAuthentication Settings page opens.2. Choose the option for the authentication protocol you want to use(Local Authentication, LDAP/LDAPS, or RADIUS). Choosing theLDAP option enables the remaining LDAP fields; selecting theRADIUS option enables the remaining RADIUS fields.3. If you choose Local Authentication, proceed to step 6.4. If you choose LDAP/LDAPS, read the section entitled ImplementingLDAP Remote Authentication for information about completing thefields in the LDAP section of the Authentication Settings page.5. If you choose RADIUS, read the section entitled ImplementingRADIUS Remote Authentication for information about completing thefields in the RADIUS section of the Authentication Settings page.6. Click OK to save.To return to factory defaults: Click the Reset to Defaults button.