Sec/User Mgmt: Step 1. Configure Active Directory

Document created by RSA Information Design and Development on Jun 25, 2017Last modified by RSA Information Design and Development on Aug 28, 2017
Version 3Show Document
  • View in full screen mode
  

See Configure Active Directory for instructions on how to use Active Directory to authenticate external user logins.

Next Step:

Step 2. Map User Roles to External Groups

You are here
Table of Contents > Set Up Public Key Infrastructure (PKI) Authentication > Configure PKI Authentication > Step 1. Configure Active Directory

Attachments

    Outcomes