Cisco DCNM-SAN Web Client Authentication
Cisco DCNM-SAN Web Server does not communicate directly with any switches in the fabric. Cisco DCNM-SAN Web Server uses its own user name and password combination that is either stored locally or stored remotely on an AAA server.
We recommend that you use a RADIUS or TACACS+ server to authenticate users in Cisco DCNM-SAN Web Server.
DETAILED STEPS
- Launch Cisco DCNM-SAN Web Client.
- Choose Admin > Management Users > Remote AAA to update the authentication used by Cisco DCNM-SAN Web Client.
- Set the authentication mode attribute to radius.
- Set the RADIUS server name, shared secret, authentication method, and ports used for up to three RADIUS servers.
- Click Modify to save this information.
- Launch Cisco DCNM-SAN Web Client.
- Choose Admin > Management Users > Remote AAA to update the authentication used by Cisco DCNM-SAN Web Client.
- Set the authentication mode attribute to tacacs.
- Set the TACACS+ server name, shared secret, authentication method, and port used for up to three TACACS+ servers.
- Click Modify to save this information.
Note Cisco DCNM-SAN does not support SecureID because it is not compatible with SNMP authentication. Cisco DCNM-SAN uses the same login credentials for all the switches in a fabric. Since SecureID cannot be used more than once for authentication, Cisco DCNM-SAN will not be able to establish a connection to the second switch using a SecureID.
Copyright 2010-2013, Cisco Systems, Inc. All rights reserved.