XYGATE User Authentication Reference Manual
XYGATE
®
User Authentication
™
Reference Manual
Contents
XYPRO Technology Corporation vii Proprietary and Confidential
12.2 LDAP-Related UACONF Keywords .............................................. 60
12.3 Prepare the NonStop System for LDAP Authentication ..................... 61
12.3.1 Checking for Network-Related Configuration .................... 61
12.3.2 Network Configuration Files that Need Checking ............... 62
12.3.3 Local CA Certificate File ............................................ 64
12.3.4 Telserv Process Configuration Checking .......................... 65
12.3.5 SSL Encryption Readiness Checking ............................... 67
12.3.6 Testing Network-Related System Configuration ................. 68
12.4 Considerations for LDAP Configuration ....................................... 69
12.5 Running the LDAP Install Macro ................................................ 70
12.6 LDAP-Related Components...................................................... 78
12.7 LDAP-Related UAGroup (UAACL) Keywords ................................... 80
12.8 The User Schema and LDAP Mapping in the UAACL File .................... 80
12.9 Testing the LDAP Interface and User Mapping ............................... 82
12.10 Configuring LDAP Lookup option ............................................... 84
12.11 Troubleshooting the XUA and LDAP Servers’ Communication ............. 85
Chapter 13. Configuring the RSA SecurID Interface .............................................. 89
13.1 Configuration Steps .............................................................. 89
13.2 RSA-Related UACONF Keywords ................................................ 90
13.3 Prepare the NonStop System for RSA SecurID Authentication ............. 91
13.3.1 Checking for Network-Related Configuration .................... 91
13.3.2 RSA Authentication Server Files that Need Checking ........... 92
13.3.3 Network Configuration Files that Need Checking ............... 93
13.3.4 Telserv Process Configuration Checking .......................... 96
13.3.5 Testing Network-Related System Configuration ................. 98
13.4 Considerations for RSA SecurID Configuration ..............................100
13.5 Preparing RSA Server for Communication with NonStop Server ..........102
13.6 Running the RSA Install Macro .................................................102
13.7 RSA-Related UAGroup (UAACL) Keywords ...................................104
13.8 Designing the User Schema and ID Mapping in the UAACL File ...........104
1
3.9 Testing the RSA Interface and User Mapping ................................105
13.10 Utilities and Programs Incompatible with RSA SecurID ....................107
13.11 Troubleshooting the XUA and RSA Authentication Manager...............108
Chapter 14. Configuring the RADIUS Interface .................................................. 111
14.1 Configuration Steps .............................................................111