Red Hat ENTERPRISE VIRTUALIZATION FOR DESKTOPS Guide d'installation Page 23

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 30
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 22
Quick Start
23
Select Hostname or IP address to manually enter the address information.
c. If defining the authentication server using hostnames or IP addresses, enter these values in the
Hostname or IP address edit field. To associate multiple authentication servers with this
authentication server record, enter multiple authentication server addresses separated by
blank spaces.
d. If defining the authentication server using hostnames or IP addresses, enter the port number
into the Port edit field. If you entered multiple authentication server addresses in the
Hostname or IP address edit field, all authentication servers must use the same port.
e. If you entered multiple authentication server addresses in the Hostname or IP address edit
field, use the Algorithm for selecting from multiple addresses drop-down menu to indicate
how the Connection Broker should select from the list of addresses when authenticating a
particular user login. Select one of the following options.
Random: The Connection Broker randomly selects an address from the list.
Circular / Round Robin: The Connection Broker uses the addresses in the order they are
entered in the Hostname or IP address edit field. For example, the first user is
authenticated using the first address, the second user is authenticated using the second
address, etc. The Connection Broker circles back to the first address in the list after all
addresses have been used.
Sequential / Failover: The Connection Broker continues to use the first address in the list
until that address can no longer be reached.
f. Click on the Encrypt connection to authentication server using SSL (LDAPS) checkbox if you
need a secure connection to the authentication server. The port number automatically
changes to 636. Re-edit the Port edit field if you are not using port 636 for secure connections.
8. In the Search Settings section, shown in the following figure, enter the username and password for
an administrator account that has read rights to the user records.
9. The User Login Search section defines where and how the Connection Broker looks for a user in the
Active Directory tree.
a. In the Sub-tree: Starting point for user search field, enter the fully qualified path in LDAP
format to the top point on the authentication server tree you want the Connection Broker to
search for users.
b. From the Match Login name against this field drop-down menu, enter the attribute that the
Vue de la page 22
1 2 ... 18 19 20 21 22 23 24 25 26 27 28 29 30

Commentaires sur ces manuels

Pas de commentaire