3.You will be prompted for the user’s real name and description under Supplementary User Info, followed by user setup details, as shown in Figure 7-23.The password authentication, in this example, is set to ACS Internal Database, the password has been entered and confirmed, and the user has been assigned to a default group. The list of groups available will be a direct result of those you configured in Figure 7-21 on page 238.

Figure 7-23 User-to-Group mappings

240Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Page 258
Image 258
IBM Tivoli and Cisco manual User-to-Group mappings