Haley,
Congrats to you and your crew on the v4 rollout - our upgrade went smooth as silk!!
Thanx and a tip o' the hat from all of us,
Don
Us as well. I'm keenly interested in the User Administration that is now built in. I like the domain authentication support, I'm wondering if you can use that for facilitating changes from Cirrus. Currently we used a single ACS account from Cirrus, I'd like to be able to change that to the currently logged in user for command logging and archiving purposes; we use domain acct's for ACS authentication. Is this what the combination security of managing nodes is - I was a little fuzzy from the Admin Guide.
Cirrus v4 provides the ability to leverage AD to automatically login to Cirrus. For accessing devices, Cirrus v4.0 provides two options:
I just want to clarify something. We can use AD to login to the Cirrus app itself; got that. When you use option 2 for accessing devices that are currently using an authentication server, it uses the device login creds assigned to the user via the "Manage Cirrus Users" GUI, and not the actual AD creds... Is that correct? If so, that creates a problem for people using AD creds on their authentication server, as it would require that the passwords in Cirrus be updated every time the AD password policy forces a user to change their password.
Now, if one can leave the "Device Login Creds" section blank for AD authenticated users, and Cirrus will automatically pass the logged in user's AD creds to the device, then that works. Otherwise, the creds in Cirrus would require constant updating for those using AD creds on their ACS.