NetScaler SDX

有限公司nfigure authentication and authorization settings

Authentication with the NetScaler SDX Management Service can be local or external. With external authentication, the Management Service grants user access based on the response from an external server. The Management Service supports the following external authentication protocols:

  • Remote Authentication Dial In User Service (RADIUS)
  • Terminal Access Controller Access-Control System (TACACS)
  • Lightweight Directory Access Protocol (LDAP)

The Management Service also supports authentication requests from SSH. The SSH authentication supports only keyboard-interactive authentication requests. The authorization of SSH users is limited to admin privileges only. Users with read-only privileges cannot log on through SSH.

To configure authentication, specify the authentication type, and configure an authentication server.

Authorization through the Management Service is local. The Management Service supports two levels of authorization. Users with admin privileges are allowed to perform any action on the management service. Users with read-only privileges are allowed to perform only read operations. The authorization of SSH users is limited to admin privileges only. Users with read-only privileges cannot log on through SSH.

授权半径和LDAP支持group extraction. You can set the group extraction attributes during the configuration of RADIUS or LDAP servers on the Management Service. The extracted group name is matched with the group names on the Management Service to determine the privileges given to the user. A user can belong to multiple groups. In that case, if any group to which the user belongs has admin privileges, the user has admin privileges. A Default Authentication group attribute can be set during configuration. This group is considered along with the extracted groups for authorization.

In TACACS authorization, the TACACS server administrator must permit a special command, admin for a user with admin privileges and deny this command for users with read-only privileges. When a user logs on to an SDX appliance, the Management Service checks if the user has permission to run this command. If the user has permission, the user is assigned the admin privileges else the user is assigned read-only privileges.

Add a user group

Groups are logical sets of users that need to access common information or perform similar kinds of tasks. You can organize users into groups defined by a set of common operations. By providing specific permissions to groups rather than individual users, you can save time when creating users.

If you are using external authentication servers for authentication, groups in SDX can be configured to match groups configured on authentication servers. When a user belonging to a group whose name matches a group on an authentication server, logs on and is authenticated, the user inherits the settings for the group.

To add a user group

  1. On the有限公司nfigurationtab, underSystem, expandUser Administration,然后单击Groups.
  2. In the details pane, clickAdd.

    add-group

  3. In theCreate System Grouppage, set the following parameters:
    • Group Name
    • Group Description
    • System Access: Select this box to give access to the entire SDX appliance and the instances running on it. Alternatively, for instance-level access, specify the instances underInstances.
    • Permission
    • 有限公司nfigure User Session Timeout
    • Users: Database users belonging to the Group. Select the users you want to add to the group.
  4. ClickCreateandClose.

Note:To create a group with admin role on an SDX appliance that is upgraded from version 10.5 to version 11.1, select the “read-write” permission and “System Access” check box. In SDX 10.5, this check box is not available and the values for Permission are “admin” and “read-only”.

有限公司nfigure user accounts

A user logs on to the SDX appliance to perform appliance management tasks. To allow a user to access the appliance, you must create a user account on the SDX appliance for that user. Users are authenticated locally, on the appliance.

Important:The password applies to the SDX appliance, Management Service, and Citrix Hypervisor. Do not change the password directly on the Citrix Hypervisor.

To configure a user account

  1. On the有限公司nfigurationtab, underSystem, expandAdministration,然后单击Users. The Users pane displays a list of existing user accounts, with their permissions.

  2. In theUserspane, do one of the following:

    • To create a user account, clickAdd.
    • To modify a user account, select the user, and then clickModify.
  3. In theCreate System UserorModify System Userdialog box, set the following parameters:

    • Name*—The user name of the account. The following characters are allowed in the name: letters a through z and A through Z, numbers 0 through 9, period (.), space, and underscore (_). Maximum length: 128. You cannot change the name.
    • Password*—The password for logging on to the appliance. Maximum length: 128
    • 有限公司nfirm Password*—The password.
    • Permission*—The user’s privileges on the appliance. Possible values:
      • admin—The user can perform all administration tasks related to the Management Service.
      • read-only—The user can only monitor the system and change the password of the account. Default: admin.
    • Enable External Authentication—Enables external authentication for this user. Management Service attempts external authentication before database user authentication. If this parameter is disabled, the user is not authenticated with the external authentication server.Note:If the remote authentication server is not reachable, the user might lose access to the appliance. In such cases, authentication falls back to the default admin user (nsroot).
    • 有限公司nfigure Session Timeout—Enables you to configure the time period for how long a user can remain active. Specify the following details:
      • Session Timeout—The time period for how long a user session can remain active.
      • 会话超时超时单位的单位,在几分钟内or hours.
    • Groups—Assign the groups to the user.

    *A required parameter

  4. Click Create or OK, and then click Close. The user that you created is listed in the Users pane.

To remove a user account

  1. On the有限公司nfigurationtab, in the navigation pane, expandSystem, expandAdministration,然后单击Users.
  2. In theUserspane, select the user account, and then clickDelete.
  3. In the Confirm message box, clickOK.

Set the authentication type

From the Management Service interface, you can specify local or external authentication. External authentication is disabled for local users by default. It can be enabled by checking the Enable External Authentication option when adding the local user or modifying the settings for the user.

Important:External authentication is supported only after you set up a RADIUS, LDAP, or TACACS authentication server.

To set the authentication type

  1. On the Configuration tab, under System, click Authentication.
  2. In the details pane, click Authentication Configuration.
  3. Set the following parameters:
    • Server Type—Type of authentication server configured for user authentication. Possible values: LDAP, RADIUS, TACACS, and Local.
    • Server Name—Name of the authentication server configured in the Management Service. The menu lists all the servers configured for the selected authentication type.

    • Enable fallback local authentication—Alternatively, you can choose to authenticate a user with the local authentication when external authentication fails. This option is enabled by default.
  4. Click OK.

Enable or disable basic authentication

You can authenticate to the Management Service NITRO interface using basic authentication. By default, basic authentication is enabled in the SDX appliance. Perform the following to disable basic authentication using the Management Service interface.

To disable basic authentication

  1. On the有限公司nfigurationtab, clickSystem.
  2. In theSystem Settingsgroup, clickChange System Settings.
  3. In the Configure System Settings dialog box, clear theAllow Basic Authenticationcheck box.
  4. ClickOK.
有限公司nfigure authentication and authorization settings