...
For these remote users to operate the
system, you must configure their access level permissions by
mapping their remote Group (in the case of AD) or Class (in the case of RADIUS) to the
desired SBC access level. This mapping configuration will dictate the
-based permissions for your remotely authenticated users:
...
Note |
---|
title | Remote User Storage and Authentication |
---|
|
Remote users are not stored on the system, instead they live on the remote authentication providers. Remote user authentication happens over the network with the appropriate external provider which is transparent to the user. |
...