You are here: Authentication
Previous TopicNext Topic

Authentication and User Management

This chapter provides the following information:

Managing IAP Users
Understanding Authentication Methods
Supported Authentication Servers
Understanding Encryption Types
Support for Authentication Survivability
Configuring Authentication Servers
Configuring 802.1X Authentication for a Network Profile
Configuring MAC Authentication for a Network Profile
Configuring MAC Authentication with 802.1X Authentication
Configuring MAC Authentication with Captive Portal Authentication
Configuring WISPr Authentication
Blacklisting Clients
Uploading Certificates

Managing Users

Configuring Administrator Credentials for the Virtual Controller Management User Interface

Configuring Guest Management Interface Administrator Credentials

Configuring Users for Internal Database of an IAP

Configuring a User with Read-Only Privilege

Adding Guest Users through the Guest Management Interface

Understanding Authentication Methods

Supported EAP Authentication Frameworks

Supported Authentication Servers

Understanding Encryption Types

Understanding Authentication Survivability

Configuring Authentication Servers

Configuring an External Server for Authentication

Configuring Dynamic RADIUS Proxy Parameters

Configuring 802.1X Authentication for a Network Profile

Configuring MAC Authentication for a Network Profile

Configuring MAC Authentication with 802.1X Authentication

Configuring MAC Authentication with Captive Portal Authentication

Configuring WISPr Authentication

Blacklisting Clients

Blacklisting Clients Manually

Blacklisting Users Dynamically

Uploading Certificates