Setting up a Remote Authentication Server

The remote authentication server settings let the LogLogic LMI appliance participate in a centralized login authentication implementation.

TACACS, RADIUS, or Active Directory can be used by the appliance as authentication servers to verify user credentials. Active Directory also allows defining roles for groups of users, to which you can assign specific user privileges and access to specific log sources. You can define up to eight remote authentication servers.

If you have configured multiple authentication servers, then the appliance attempts to authenticate a user using all servers one after another until the user is finally found on a server and authentication is successful. For example, If the authentication attempt fails on server1 (for example, the user does not have an account on server1), then the appliance attempts to authenticate the user on server2, and if necessary and applicable, on server3 and server4, and so on. An error is logged for each server on which the user is not found.

Prerequisites

  • Add the appropriate users to the remote authentication server or ensure that their login IDs already exist.
  • For TACACS or RADIUS:
    • Add the IP addresses of the LogLogic LMI appliance to your remote authentication server.
    • If you have a failover configuration, you must add the private IP addresses from both appliances to the remote authentication server. For details, see Failover.

Procedure

  1. Go to Administration > System Settings > Remote Servers.
  2. Select the appropriate option for the Remote Authentication Servers:
    Option Description Default Port
    RADIUS Configure a remote server using the RADIUS protocol. RADIUS is used only for access control, and not for RADIUS accounting. 1812
    TACACS Configure a remote server using the TACACS+ protocol. 49
    Active Directory Configure a remote Active Directory server. The appliance roles associated with groups on the Active Directory server are used for controlling appliance authentication, user privileges, and access to log sources. 389

What to do next

Continue with the procedure for the remote authentication server option that you selected.