11-3
Cisco Secure ACS 3.0 for Windows 2000/NT Servers User Guide
78-13751-01, Version 3.0
Chapter11 Working with User Databases CiscoSecure User Database
Figure 11-1 Using the CiscoSecure User Database for Authentication
There are five ways to create user accounts in the CiscoSecure user database:
Using the Cisco Secure ACS HTML interface (see the Adding a Basic User
Account section on page 7-5).
Using the Database Replication feature (see the CiscoSecure Database
Replication section on page 8-6).
Using the Database Import utility, CSUtil.exe (see the Cisco Secure ACS
Command-Line Database Utility section on page E-1.)
Using the RDBMS Synchronization feature (see the RDBMS
Synchronization section on page 8-24).
Using the Unknown User Policy feature (see the Administering External
User Databases section on page 12-1).
The CiscoSecure user database also is crucial for the authorization process.
Regardless of whether a user is authenticated by the internal user database or by
an external user database, Cisco Secure ACS authorizes network services for
users based upon group membership and specific user settings found in the
CiscoSecure user database. Thus, all users authenticated by Cisco Secure ACS,
even those whose authentication is performed with an external user database, have
an account in the CiscoSecure user database. As always, user settings override
group settings.