Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
The Monitoring and Reports part of ACS 5.x contains information about the incoming authentication requests (TACACS+ and RADIUS) also information about the health of each ACS node in the deployment. The Monitoring and Report Dashboard gives us a quick...
Hi John,You can enable password expiry for the users that login for the first time so that they are asked to change their password when they login for the first time. For this, you will have to enable 'Password Aging Rules' on the ACS (this is applie...
Hi Daniele,I have seen the same issue with another customer - the problem is that you're using the "root" username. Root is the username that the Linux OS uses, and by setting "root" as the username when you go through the configuration process you e...
Hi Colin,Sorry, I missed the 2nd part of your question. I read the first part and understood it as a question about how to get the ACS to authenticate a user against a particular identity store depending on what the username was appended to (eg. @exa...
Hi Colin,I believe this is what you're looking for:1. Go to Access Policies > Access Services > Defaunt Network Access > Identity2. Click on the radio-button for "Rule based result selection" (if not already selected).3. Click on "Customize" (bottom ...
Based on the previous comments, it looks like we've got a few number of ACS 5 instances that are running on ESX 4.1 without any problems.Can the other posters that are seeing problems with ACS 5 and ESX4.1 please confirm that the guest operating syst...