Designing Access Controls
Choose RADIUS Servers
Choose RADIUS ServersAs you will recall from Chapter 1: “Access Control Concepts,” the authentication architecture consists of four primary components:
■Endpoint
■Policy enforcement point (PEP)
■Policy decision point (PDP)
■Policy and credential repository
FigureIn this step, you will select and decide how to deploy your PDPs and policy repositories.