Chapter 3: KX III Administration63Modifying an Existing UserTo modify an existing user:1. Open the User List page by choosing User Management > User List.2. Locate the user from among those listed on the User List page.3. Click the user name. The User page opens.4. On the User page, change the appropriate fields. See Adding a NewUser (on page 60) for information about how to get access the Userpage.5. To delete a user, click Delete. You are prompted to confirm thedeletion.6. Click OK.Authentication SettingsAuthentication is the process of verifying that a user is who he says heis. Once a user is authenticated, the user's group is used to determinehis system and port permissions. The user's assigned privilegesdetermine what type of access is allowed. This is called authorization.When the KX III is configured for remote authentication, the externalauthentication server is used primarily for the purposes of authentication,not authorization.If you are using a tiered configuration in which a base KX III device isused to access multiple other tiered devices, the base device and thetiered devices must using the same authentication settings.From the Authentication Settings page you can configure the type ofauthentication used for access to your KX III.Note: When remote authentication (LDAP/LDAPS or RADIUS) isselected, if the user is not found, the local authentication database willalso be checked.To configure authentication:1. Choose User Management > Authentication Settings. TheAuthentication Settings page opens.2. Choose the option for the authentication protocol you want to use(Local Authentication, LDAP/LDAPS, or RADIUS). Choosing theLDAP option enables the remaining LDAP fields; selecting theRADIUS option enables the remaining RADIUS fields.3. If you choose Local Authentication, proceed to step 6.4. If you choose LDAP/LDAPS, read the section entitled ImplementingLDAP Remote Authentication for information about completing thefields in the LDAP section of the Authentication Settings page.