Enable fallback and cascade external authentication servers 编辑

October 8, 2021 Contributed by:  S

Enable fallback and cascade external authentication servers

Fallback option enables local authentication to take over if the external server authentication fails. A user configured on both Citrix ADM and external authentication server can log on to Citrix ADM, even if the configured external authentication servers are down or not reachable. To ensure fallback authentication work:

  • Non-nsroot users must be able to access Citrix ADM if external server is down or not reachable

  • You must add at least one external server

Citrix ADM also supports a unified system of authentication, authorization, and accounting (AAA) protocols (LDAP, RADIUS, and TACACS), along with local authentication. This unified support provides a common interface to authenticate and authorize all users and external AAA clients accessing the system.

Citrix ADM can authenticate users regardless of the actual protocols they to communicate with the system.Cascading external authentication servers provides a continuous non-failing process for authenticating and authorizing external users. If authentication fails on the first authentication server, Citrix ADM attempts to authenticate the user by using the second external authentication server, and so on. To enable cascade authentication, you must add the external authentication servers in Citrix ADM. You can add any type of the supported external authentication servers (RADIUS, LDAP, and TACACS).

For example, consider that you want to add four external authentication servers and configured two RADIUS servers, one LDAP server, and one TACACS server. Citrix ADM attempts to authenticate with the external servers, based on the configurations. In this example scenario, Citrix ADM attempts to:

  • Connect with the first RADIUS server

  • Connect with the second RADIUS server, if the authentication has failed with first RADIUS server

  • Connect with the LDAP server, if the authentication has failed with both RADIUS servers

  • Connect with the TACACS server, if the authentication has failed with both RADIUS servers and LDAP server.

Note

You can configure up to 32 external authentication servers in Citrix ADM.


Configure fallback and cascade external servers

  1. Navigate to Settings > Authentication.

  2. On the Authentication page, click Settings

  3. On the Authentication Configuration page, select EXTERNAL from the Server Type list (only external servers can be cascaded).

  4. Click Insert, and on the External Servers page, select one or multiple authentication servers to cascade.

  5. Select the Enable fallback local authentication check box if you want the local authentication to take over if the external authentication fails.

  6. Select the Log external group information check box if you want to capture the external user group information in the system audit log.

  7. Click OK to close the page.

    The selected servers are displayed under External Servers:

    External servers

You can also specify the order of authentication by using the icon next to the server names to move servers up or down the list.

如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

扫码二维码加入Web技术交流群

发布评论

需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。
列表为空,暂无数据

词条统计

浏览:48 次

字数:3883

最后编辑:6 年前

编辑次数:0 次

    我们使用 Cookies 和其他技术来定制您的体验包括您的登录状态等。通过阅读我们的 隐私政策 了解更多相关信息。 单击 接受 或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
    原文