B-36
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Appendix B Authentication in ACS 5.3
Authentication Protocol and Identity Store Compatibility
Table B-5 specifies EAP authentication protocol support.
Table B-5 EAP Authentication Protocol and User Database Compatibility
Identity Store EAP-MD5 EAP-TLS1
1. In EAP-TLS authentication, the user is authenticated by cryptographic validation of the certificate. Additionally, ACS 5.3
optionally allows a binary comparison of the user’s certificate sent by the end-user client against the certificate located in the
user’s record in the LDAP identity store.
PEAP
EAP-MSCHAPv2
EAP-FAST
MSCHAPv2 PEAP-GTC EAP-FAST-GTC
ACS Yes Yes2
2. ACS Identity Store cannot store the certificates.
Yes Yes Yes Yes
Windows AD No Yes Yes Yes Yes Yes
LDAP No Yes No No Yes Yes
RSA Identity
Store
No No No No Yes Yes
RADIUS
Identity Store
No No No No Yes Yes