Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...


Anchor
About Admin Accounts
About Admin Accounts
Anchor
bookmark381
bookmark381
Anchor
bookmark382
bookmark382
About Admin Accounts
A user must have an admin account to log in to the NIOS appliance. Each admin account belongs to an admin group, which contains roles and permissions that determine the tasks a user can perform. For information, see About Admin Groups.
When an admin connects to the appliance and logs in with a username and password, the appliance starts a two-step process that includes both authentication and authorization. First, the appliance tries to authenticate the admin using the username and password. Second, it determines the authorized privileges of the admin by identifying the group to which the admin belongs. It grants access to the admin only when it successfully completes this process.
The NIOS appliance can authenticate users that are stored on its local database as well as users stored remotely on an Active Directory domain controller, a RADIUS server, a TACACS+ server or an LDAP server. The group from which the admin receives privileges and properties is stored locally.
NIOS can authenticate users based on X.509 client certificates irrespective of the client certificate source. For example, smart card holders such as U.S. Department of Defense CAC users and PIV card holders. The status of these certificates is stored remotely on OCSP (Online Certificate Status Protocol) responders. NIOS uses two-factor authentication to validate these users. For more information about two-factor authentication and how to configure it, see Authenticating Admins Using Two-Factor Authentication.
The tasks involved in configuring administrator accounts locally and remotely are listed in Table 4.1.
Anchor
bookmark383
bookmark383
Table 4.1 Storing Admin Accounts Locally and Remotely

...

The admin policy defines how the appliance authenticates the admin: with the local database, RADIUS, Active Directory, TACACS+, or LDAP. You must add RADIUS, Active Directory, TACACS+, or LDAP as one of the authentication methods in the admin policy to enable that authentication method for admins. See Defining the Authentication Policy for more information about configuring the admin policy.

Figure 4.1 illustrates the relationship of local and remote admin accounts, admin policy, admin groups, and permissions and properties.

Anchor
bookmark384
bookmark384
Figure 4.1 Privileges and Properties Applied to Local and Remote Admin Accounts


Drawio
width
bordertrue1
viewerToolbartrue
fitWindowfalse
baseUrlhttps://infoblox-docs.atlassian.net/wiki
diagramName4.1
simpleViewerfalse
zoom1
pageId22250334
custContentId7345614
lbox1
contentVer1
revision1

Complete the following tasks to create an admin account:

...