Implementing User Authentication

Take the following steps to implement user authentication:

  • Determine the types of devices to be authenticated.
  • Determine the correct authentication type for each device.
  • Determine an appropriate policy best suited for the use of that device on your network.
  • Configure RADIUS user accounts on the authentication server for each device.
  • Configure user authentication.