11-47
Cisco Secure ACS 3.0 for Windows 2000/NT Servers User Guide
78-13751-01, Version 3.0
Chapter11 Working with User Databases Token Server User Databases
•Retries—The number of authentication attempts Cisco Secure ACS makes
before failing over to the secondary proxy RADIUS server.
•Failback Retry Delay (minutes)—The number of minutes after which
Cisco Secure ACS attempts authentications using a failed primary proxy
RADIUS server.
Note If both the primary and the secondary servers fail,
Cisco Secure ACS alternates between both servers until one
responds.
Step 8 Click Submit.
Result: Cisco Secure ACS saves the proxy RADIUS token server database
configuration you created. You can add it to your Unknown User Policy or assign
specific user accounts to use this database for authentication. For more
information about the Unknown User Policy, see the “Unknown User Processing”
section on page 12-1. For more information about configuring user accounts to
authenticate using this database, see Chapter 7, “Setting Up and Managing User
Accounts.”
Token Server User DatabasesCisco Secure ACS supports the use of token servers for the increased security
provided by one-time passwords (OTPs). This section includes the following
topics:
•About Token Servers and Cisco Secure ACS, page 11-48
•About Token Servers and Cisco Secure ACS, page 11-48
•RADIUS-Enabled Token Servers, page11-49
•Token Servers with Vendor-Proprietary Interfaces, page11-53