|
|
Chapter 8. Configuring User GroupsIn this chapter, you learn the following topics:
In Chapter 3, "Authentication Configuration on Cisco Routers," you configured a user into the Access Control Server (ACS) database and were able to test authentication to the local ACS database as well as the Windows NT/2000 domain. In this chapter, you explore the group configurations of ACS as well as enable special user-level configurations for particular members of a given group. In this chapter, you also perform configurations that include group settings as well as user-level settings. NOTE As with any network, you probably have users that are members of a group, yet still require special network privileges. With the ability in ACS to configure group policy and then override it within User Setup, this task becomes very simple. The understanding that is assumed from here on out is that user-level configuration always overrides group-level configuration. |
|
|