12: User Authentication
SLC™ Console Manager User Guide 179
escapeseq <1-10 Chars>
listenports <Port List>
master <IP Address or Hostname>
slave1 <IP Address or Hostname>
slave2 <IP Address or Hostname>
slave3 <IP Address or Hostname>
slave4 <IP Address or Hostname>
slave5 <IP Address or Hostname>
state <enable|disable>
To set group and permissions for NIS users:
set nis group <default|power|admin>
To set permissions for NIS users not already defined by the user rights group:
set nis permissions <Permission List>
where
<Permission List> is one or more of nt, sv, dt, lu, ra, sk, um, dp, ub,
rs, rc, dr, wb, sn, ad, po, pc
To remove a permission, type a minus sign before the two-letter abbreviation for a user
right.
To set a default custom menu for NIS users:
set nis custommenu <Menu Name>
To view NIS settings:
show nis
LDAP
The system administrator can configure the SLC console manager to use LDAP to authenticate
users attempting to log in using the Web, Telnet, SSH, or the console port.
LDAP allows SLC users to authenticate using a wide variety of LDAP servers, such as OpenLDAP
and Microsoft Active Directory. The LDAP implementation supports LDAP servers that do not
allow anonymous queries.
Users who are authenticated through LDAP are granted device port access through the port
permissions on this page.
All LDAP users are members of a group that has predefined user rights associated with it. You can
add additional user rights that are not defined by the group.
To configure the SLC unit to use LDAP to authenticate users:
1. Click the User Authentication tab and select LDAP. The following page displays.