Previous Topic: Adapter for Cisco IPSec VPN Configuration GuideNext Topic: Checking RADIUS Protocol Support in AuthMinder Server


Performing Post-Installation Tasks

This document describes the configurations that are required to integrate CA Adapter with the Cisco IPSec VPN appliance to provide secure access to resources.

Note: Before you configure AuthMinder, ensure that Adapter is installed and configured. For information about installing and configuring Adapter, see CA Adapter Installation and Configuration Guide.

Authentication Flow Manager (AFM) functions as a proxy between CA AuthMinder and VPN Client. After you install and configure AFM, you must configure AuthMinder to communicate with your VPN server. This section walks you through the process of configuring AuthMinder.

Cisco IPSec VPN uses the Remote Authentication Dial In User Service (RADIUS) protocol for centralized access, authorization, and accounting management. To enable AuthMinder Server for the RADIUS protocol support, perform the following tasks:

  1. Enable the RADIUS protocol in AuthMinder Server.
  2. Create a RADIUS client.

For complete information about working with the RADIUS protocol in AuthMinder, see CA AuthMinder Installation and Deployment Guide.

Note: CA Adapter still contains the terms Arcot, WebFort, and RiskFort in some of its code objects and other artifacts. Therefore, the CA Adapter documentation also contains occurrences of Arcot, WebFort, and RiskFort. In addition, some of the topics in this guide do not follow the standard formatting guidelines. These inconsistencies will be fixed in a future release.