Page 184
Manual
ResistTel IP2 / IP152
ExResistTel IP2 / IP154
1.
Enter a LDAP password. This password is used to encrypt keys in the LDAP
directory of the server.
2.
Configure the name of the realm.
Now the server is running. You can now create and manage user accounts.
4.3.2.1.3.2
Setting up the Client Devices
Configuration of the clients is done using the General/Admin page from the web
administration interface.
1.
Configure the
Server Locations
of the Kerberos servers of all involved realms.
Don't forget servers that are needed for cross-realm authentication.
2.
Join
the desired Kerberos realm. You will need administrator credentials from
that realm in order to do that.
Now the device can authenticate users from the realm for HTTPS connections. You
can deactivate the local user accounts on the device, if needed.
Tip
The box that hosts the Kerberos server might also be a client device and have to
join the realm.
4.3.2.1.3.3
Setting up Cross-Realm Authentication
1.
On the server device, specify the
Trusted Realms
, the corresponding
passwords and the methods of authorization mapping.
2.
Configure the
Server Location
on each client device.
There are different methods of mapping authorization between realms
keep (works only with special servers)
Grant administrator access to all users
Grant viewer access to all users
Map the Windows domain group membership from the ticket to administrator
or viewer rights
Summary of Contents for ExResistTel IP2/IP154
Page 43: ...Manual ResistTel IP2 IP152 Page 43 ExResistTel IP2 IP154 Figure 9 Set View ...
Page 386: ...Page 386 Manual ResistTel IP2 IP152 ExResistTel IP2 IP154 ...
Page 387: ...Manual ResistTel IP2 IP152 Page 387 ExResistTel IP2 IP154 ...
Page 390: ...Page 390 Manual ResistTel IP2 IP152 ExResistTel IP2 IP154 ...