User's Manual

B-36
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Appendix B Authentication in ACS 5.3
Authentication Protocol and Identity Store Compatibility
Table B-5 specifies EAP authentication protocol support.
Table B-5 EAP Authentication Protocol and User Database Compatibility
Identity Store EAP-MD5 EAP-TLS
1
1. In EAP-TLS authentication, the user is authenticated by cryptographic validation of the certificate. Additionally, ACS 5.3
optionally allows a binary comparison of the user’s certificate sent by the end-user client against the certificate located in the
user’s record in the LDAP identity store.
PEAP
EAP-MSCHAPv2
EAP-FAST
MSCHAPv2 PEAP-GTC EAP-FAST-GTC
ACS Yes Yes
2
2. ACS Identity Store cannot store the certificates.
Yes Yes Yes Yes
Windows A D No Yes Yes Yes Yes Ye s
LDAP No Yes N o No Ye s Ye s
RSA Identity
Store
No No No No Yes Yes
RADIUS
Identity Store
No No No No Yes Yes