Authentication Configuring Authentication for ACS Logins Selecting Security > Authentication brings up the form shown in the following figure, which comprises six tabs. Expert > Security > Authentication You can use the Authentication forms to: • Select a method for authenticating logins to ACS. • Identify authentication servers that are configured for logins to ACS or to the serial ports.