How to Configure Remote Agent for Domain
Controller Authentication
When ACS Remote
Agent for Windows runs on a domain controller and you need to
authenticate users
with a Windows
user database, the additional configuration required varies,
depending upon your
Windows
networking configuration. Some of the subsequent steps are
always applicable when the
remote agent runs
on a domain controller; other steps are required only in certain
conditions, as noted at
the beginning of
the step.
Perform only
those steps that always apply and those that apply to your
Windows networking
configuration:
Step 1 Add CISCO
workstation.
To satisfy
Windows requirements for authentication requests, ACS must
specify the Windows
workstation in to
which the user tries to log. Because ACS cannot determine this
information from
authentication
requests that AAA clients send, it uses a generic workstation
name for all requests. Use
CISCO as the name
of the workstation.
In the local
domain, and in each trusted domain and child domain that ACS
will use to authenticate users,
ensure that:
• A computer
account named CISCO exists.
• All users that
Windows will authenticate have permission to log in to the
computer named CISCO.
For more
information, see the Microsoft documentation for your operating
system.
Step 2 Verify the
server service status.
The remote agent
depends on the Server service, which is a standard service in
Microsoft Windows. On
the computer that
is running the remote agent, verify that the Server service is
running and that its
Startup Type is
set to Automatic.
Tip To configure
the Server service, use the local administrator account to log
in to the computer that is
running ACS.
Choose Start > Programs Administrative Tools > Services. The
services appear
alphabetically.
For more
information, see the Microsoft documentation for your operating
system.
Step 3 Verify the
NTLM version.
Note This step is
required only if ACS authenticates users who belong to trusted
domains or child domains.
ACS supports
authentication of Windows credentials by using LAN Manager (LM),
NTLM version 1,
or NTLM version 2
protocols. LAN Manager is considered the weakest protocol and
NTLM version 2
is the strongest.
You can support one or more protocols, but must ensure that:
a. Regardless of
the version of NTLM that you use, you must configure the LAN
Manager
Authentication
level settings. In the applicable Windows security policy
editor, choose Local
Policies >
Security Options; locate the LAN Manager Authentication Level
policy; and set the
policy. For
example, if you are using LM or NTLM version 1, set it to Send
LM & NTLM
responses. For
information on the various options and NTLM version 2
settings, see the appropriate
NTLM authentication-level documentation on the Microsoft
website.
Post your questions, comments, feedbacks and suggestions
Contact a consultant
Related Topics
|