Introduction > Security > Authentication > Choosing Among Authentication Methods

Choosing Among Authentication Methods
The administrator can select among authentication methods to control logins to the following components:
The authentication method chosen for the KVM/netPlus is used for subsequent access through Telnet, SSH, or the WMI.
The following table describes the supported authentication methods and indicates which methods are available for the KVM/netPlus and which are available for KVM ports. All authentication methods except “Local” and “OTP” require an authentication server, which the administrator specifies while selecting the authentication method. The KVM/netPlus uses local authentication if any of the authentication servers fails.
All
KVM Ports
Uses user/password file for local authentication.
Authentication is performed locally first, switching to Radius if unsuccessful.
Authentication is performed locally first, switching to TacacsPlus if unsuccessful.
Authentication is performed locally first, switching to NIS if unsuccessful.
Uses Kerberos network authentication protocol
Uses local authentication if Kerberos authentication fails
Uses local authentication if Kerberos server is down
Uses LDAP (Light-weight directory access protocol)
Uses local authentication if LDAP authentication fails
Uses local authentication if LDAP server is down
Uses local authentication if NIS authentication fails
Uses local authentication if NIS server is down
Uses RADIUS authentication
Uses local authentication if RADIUS authentication fails
 
Uses local authentication if RADIUS server is down
 
Uses Terminal Access Controller Access Control System (TACACS+) authentication.
 
Uses local authentication if TACACS+ authentication fails
 
Uses local authentication if TACACS+ server is down
 
Uses SMB authentication for Microsoft Windows NT/2000/2003
Uses local authentication if NTLM server is down
Uses One-Time- Password (OPIE) authentication method for dial-in through a modem PCMCIA card.

Introduction > Security > Authentication > Choosing Among Authentication Methods