-
-
Enable fallback and cascade external authentication servers
-
-
-
-
Importing and synchronizing StyleBooks from GitHub repository
-
Simplified migration of Citrix ADC application configuration using StyleBooks
-
-
Use ADM log messages for managing and monitoring your infrastructure
-
-
Citrix ADC automation using Citrix ADM in Cisco ACI hybrid mode
-
Citrix ADC device package in Cisco ACI's cloud orchestrator mode
-
This content has been machine translated dynamically.
Dieser Inhalt ist eine maschinelle Übersetzung, die dynamisch erstellt wurde. (Haftungsausschluss)
Cet article a été traduit automatiquement de manière dynamique. (Clause de non responsabilité)
Este artículo lo ha traducido una máquina de forma dinámica. (Aviso legal)
此内容已经过机器动态翻译。 放弃
このコンテンツは動的に機械翻訳されています。免責事項
이 콘텐츠는 동적으로 기계 번역되었습니다. 책임 부인
Este texto foi traduzido automaticamente. (Aviso legal)
Questo contenuto è stato tradotto dinamicamente con traduzione automatica.(Esclusione di responsabilità))
This article has been machine translated.
Dieser Artikel wurde maschinell übersetzt. (Haftungsausschluss)
Ce article a été traduit automatiquement. (Clause de non responsabilité)
Este artículo ha sido traducido automáticamente. (Aviso legal)
この記事は機械翻訳されています.免責事項
이 기사는 기계 번역되었습니다.책임 부인
Este artigo foi traduzido automaticamente.(Aviso legal)
这篇文章已经过机器翻译.放弃
Questo articolo è stato tradotto automaticamente.(Esclusione di responsabilità))
Translation failed!
Enable fallback and cascade external authentication servers
Fallback option enables local authentication to take over if the external server authentication fails. A user configured on both Citrix ADM and external authentication server can log on to Citrix ADM, even if the configured external authentication servers are down or not reachable. To ensure fallback authentication work:
-
Non-nsroot users must be able to access Citrix ADM if external server is down or not reachable
-
You must add at least one external server
Citrix ADM also supports a unified system of authentication, authorization, and accounting (AAA) protocols (LDAP, RADIUS, and TACACS), along with local authentication. This unified support provides a common interface to authenticate and authorize all users and external AAA clients accessing the system.
Citrix ADM can authenticate users regardless of the actual protocols they to communicate with the system. Cascading external authentication servers provides a continuous non-failing process for authenticating and authorizing external users. If authentication fails on the first authentication server, Citrix ADM attempts to authenticate the user by using the second external authentication server, and so on. To enable cascade authentication, you must add the external authentication servers in Citrix ADM. You can add any type of the supported external authentication servers (RADIUS, LDAP, and TACACS).
For example, consider that you want to add four external authentication servers and configured two RADIUS servers, one LDAP server, and one TACACS server. Citrix ADM attempts to authenticate with the external servers, based on the configurations. In this example scenario, Citrix ADM attempts to:
-
Connect with the first RADIUS server
-
Connect with the second RADIUS server, if the authentication has failed with first RADIUS server
-
Connect with the LDAP server, if the authentication has failed with both RADIUS servers
-
Connect with the TACACS server, if the authentication has failed with both RADIUS servers and LDAP server.
Note
You can configure up to 32 external authentication servers in Citrix ADM.
Configure fallback and cascade external servers
-
Navigate to System > Authentication.
-
On the Authentication page, click Settings
-
On the Authentication Configuration page, select EXTERNAL from the Server Type list (only external servers can be cascaded).
-
Click Insert, and on the External Servers page, select one or multiple authentication servers to cascade.
-
Select the Enable fallback local authentication check box if you want the local authentication to take over if the external authentication fails.
-
Select the Log external group information check box if you want to capture the external user group information in the system audit log.
-
Click OK to close the page.
The selected servers are displayed under External Servers:
You can also specify the order of authentication by using the icon next to the server names to move servers up or down the list.
Share
Share
This Preview product documentation is Cloud Software Group Confidential.
You agree to hold this documentation confidential pursuant to the terms of your Cloud Software Group Beta/Tech Preview Agreement.
The development, release and timing of any features or functionality described in the Preview documentation remains at our sole discretion and are subject to change without notice or consultation.
The documentation is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making Cloud Software Group product purchase decisions.
If you do not agree, select I DO NOT AGREE to exit.