Configuring User Access and Authentication
If the built-in authentication server of iMaster NCE-Campus is used, administrators need to add users and configure the user authentication mode on iMaster NCE-Campus before user authentication and authorization can be implemented. A security group can be bound to the authorization result for a user group on iMaster NCE-Campus. When the authentication device enforces the security group policy, it can control user access permissions based on the security group bound to the authorization result.
Adding Users
Context
After an administrator configures a user group and adds a user account to the group on the user management page, a user can use this account for authentication. It is recommended that user accounts with the same permissions be added to the same user group. This facilitates subsequent authorization based on user groups.
Configuration Tasks
Task Description |
Deployment Procedure |
---|---|
Adding a Portal authentication user |
|
Adding an 802.1X authentication user |
|
Adding a MAC address authentication user |
Configuring Authentication Rules
Context
After user accounts are added, administrators need to configure authentication rules for different authentication modes on iMaster NCE-Campus, so that iMaster NCE-Campus can authenticate users attempting to access the network.
Configuration Tasks
Task Description |
Deployment Procedure |
---|---|
Configuring Portal authentication rules |
Perform the tasks in Portal Authentication: |
Configuring 802.1X authentication rules |
|
Configuring MAC address authentication rules |
Configuring an Authentication Rule in MAC Address Authentication |
Configuring Authorization Results and Authorization Rules
Context
After users are authenticated, authorization results are delivered to them based on authorization rules. An authorization result includes information about user permissions, such as the VLAN and security group. User permissions can be controlled through association between authorization rules and authorization results.
Configuration Tasks
Task Description |
Deployment Procedure |
---|---|
Configuring authorization results |
|
Configuring authorization rules |