Chapter 2: Installation and Configuration21Note to CC-SG UsersIf you are using the Dominion KX II in a CC-SG configuration, performthe installation steps, and when finished, consult the CommandCenterSecure Gateway User Guide, Administrator Guide, or Deployment Guideto proceed (all found on Raritan's website, www.raritan.com, underSupport).Note: The remainder of this user guide applies primarily to deployingDominion KX II device(s) without the integration functionality of CC-SG.Remote AuthenticationNote to CC-SG UsersWhen the Dominion KX II is controlled by CommandCenter SecureGateway, CC-SG authenticates users and groups, except for local users(requiring local port access). When CC-SG is controlling the DominionKX II, local port users will be authenticated against the local userdatabase or the remote authentication server (LDAP/LDAPS or RADIUS)configured on the Dominion KX II; they will not be authenticated againstthe CC-SG user database.For additional information about CC-SG authentication, see theCommandCenter Secure Gateway User Guide, Administrator Guide, orDeployment Guide, which can be downloaded from the Support sectionof the Raritan website (www.raritan.com).Supported ProtocolsIn order to simplify management of usernames and passwords, theDominion KX II provides the capability to forward authentication requeststo an external authentication server. Two external authenticationprotocols are supported: LDAP/LDAPS and RADIUS.Note on Microsoft Active DirectoryMicrosoft Active Directory uses the LDAP/LDAPS protocol natively, andcan function as an LDAP/LDAPS server and authentication source forthe Dominion KX II. If it has the IAS (Internet Authorization Server)component, a Microsoft Active Directory server can also serve as aRADIUS authentication source.