SonicOS 7.1 Users
- SonicOS 7.1
- About SonicOS
- About User Management
- Using Local Users and Groups for Authentication
- Using RADIUS for Authentication
- Using LDAP/Active Directory/eDirectory Authentication
- Using RADIUS
- Using TACACS+
- Using Single Sign-On
- What is Single Sign-On?
- Benefits of SonicWall SSO
- Platforms and Supported Standards
- How Does Single Sign-On Work?
- How Does SSO Agent Work?
- How Does Terminal Services Agent Work?
- How Does Browser NTLM Authentication Work?
- How Does RADIUS Accounting for Single-Sign-On Work?
- Installing the Single Sign-On Agent and/or Terminal Services Agent
- Single Sign-On Advanced Features
- Configuring Access Rules
- Managing SonicOS with HTTP Login from a Terminal Server
- Viewing and Managing SSO User Sessions
- Multiple Administrator Support
- Configuring Users Status
- Configuring User Settings
- User Login Settings
- Setting the Authentication Method for Login
- Configuring RADIUS Authentication
- Configuring LDAP
- Configuring TACACS+
- Requiring User Names be Treated as Case-Sensitive
- Preventing Users From Logging in from More than One Location
- Forcing Users to Log In Immediately After Changing Their Passwords
- Displaying User Login Information Since the Last Login
- Setting the Single-Sign-On Methods
- One-Time Password Settings
- Configuring the User Web Login Settings
- Adding URLs to Authentication Bypass
- User Session Settings
- Accounting
- [[[Missing Linked File System.LinkedTitle]]]
- User Login Settings
- Configuring and Managing Partitions
- Configuring Local Users and Groups
- Configuring Guest Services
- Configuring Guest Accounts
- Managing Guest Status
- SonicWall Support
Configuring RADIUS Users Settings
- Navigate to Device >Users > Settings > Accounting.
- Next to Configure RADIUS, click Configure.
The RADIUS Configuration page is displayed.
-
On the Radius Users tab, do the following:
-
Select Allow only users listed locally if only the users listed in the SonicOS database are authenticated using RADIUS.
-
Select the mechanism used for setting user group memberships for RADIUS users from the following choices:
-
Select Use vendor-specific attribute on RADIUS server to apply a configured vendor-specific attribute from the RADIUS server. The attribute must provide the user group to which the user belongs.
-
Select Use RADIUS Filter-Id attribute on RADIUS server to apply a configured Filter-Id attribute from the RADIUS server. The attribute must provide the user group to which the user belongs.
-
Select Use LDAP to retrieve user group information to obtain the user group from the LDAP server. You can click the Configure button to set up LDAP if you have not already configured it or if you need to make a change.
-
If you do not plan to retrieve user group information from RADIUS or LDAP, select Local configuration only.
-
Select the group from the Default user group to which all RADIUS users belong drop-down menu. See Configuring Local Groups.
-
-
- Click Save.
Was This Article Helpful?
Help us to improve our support portal