Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

 

Table of Contents

Introduction

NMIS 8.4G introduced general availability of the full authorisation and authentication model in NMIS using internal or external authentication methods.  This ensures that NMIS remains an enterprise class network management system.  Once authenticated a user is looked up in the internal authorisation system to determine their role, this role is customisable and extensible.

The implementation of the authorisation, limits As of January 2012, NMIS8 uses Apache for Authentication and implements Authorisation with an internal system, limiting groups of users by roles to specific things they can view and do with NMIS, and groups of devices/nodes on which they can do it.  This is commonly referred to as role based access control.

Types of External Authentications

The following table lists the NMIS configuration option and the type of authentication which it works with.

MethodDescription
htpasswd 
ldap and ldaps 

ms-ldap and ms-ldaps

 

radius 
tacacs 

Configuration of the External Authentications

In the NMIS configuration you can configure multiple methods which are used for auth failure, so if ms-ldap fails, it will fail back to htpasswd for example.

Adding a New User to NMIS8

...