fbpx

Authentication | MSP Management

Opmantek allows you the flexibility to use custom authentication protocols for your organizational needs.

What is Authentication?

Network authentication is the layer(s) of protection that you have in place that ensures that only authorised people accesses your assets. Every organization will have some form of authentication method, some more sophisticated than others, the key for a useful network management platform is the ability to use whatever method you have in place.

NMIS leverages a full authorisation and authentication model, that has the ability to uses internal or external authentication methods.  Once authenticated a user is looked up in the internal authorisation system to determine their role, this role is customisable and extensible. The implementation of this authorisation, limits the ability for users, or groups of users (roles), to view or do anything with NMIS and the groups of devices/nodes on which they have access to.This is commonly referred to as role based access control.

Authentication Methods

The following is a list of authentication methods that NMIS works with.

MSP Management - Authentication Gradient Icon

Apache

Apache will perform authentication and provide an authenticated user to NMIS, which will have authorisation policies applied.

MSP Management - Authentication Gradient Icon

htpasswd

NMIS will use the users defined in the NMIS Users file, by default /usr/local/nmis8/conf/users.dat

MSP Management - Authentication Gradient Icon

LDAP

MIS will use the configured LDAP server to perform authentication
 
Note: requires Optional Perl Module: Net::LDAP

MSP Management - Authentication Gradient Icon

LDAPS

NMIS will use the configured LDAP server to perform authentication
 
Note: Requires Optional Perl Modules: IO::Socket::SSL and Net::LDAPS

MSP Management - Authentication Gradient Icon

MS-LDAP

NMIS will use the configured LDAP server to perform authentication
 
Note: Requires Optional Perl Modules: IO::Socket::SSL and Net::LDAPS

MSP Management - Authentication Gradient Icon

MS-LDAPS (Secure)

NMIS will use the configured Microsoft Active Directory (LDAP) server to perform authentication
 
Note: Requires Optional Perl Modules: IO::Socket::SSL and Net::LDAPS

MSP Management - Authentication Gradient Icon

PAM

Debian/Ubuntu:
 
The webserver user must be able to read the /etc/shadow file, which can be achieved by adding the webserver user to the shadow group: Run sudo adduser www-data shadow
 
CentOS/RedHat:
 
CentOS and RHEL require further configuration steps to enable PAM.

MSP Management - Authentication Gradient Icon

Radius

NMIS will use the configured radius server (Cisco ACS or Steel Belted Radius for example)
 
Note: Requires Optional Perl Modules: Authen::Simple::RADIUS

MSP Management - Authentication Gradient Icon

TACACS

NMIS will use the configured Tacacs+ server (Cisco ACS for example)
 
Note: Requires Optional Perl Modules: Authen::TacacsPlus

Blogs about Authentication

Blog Articles Icon - Gradient

Open-AudIT can use Active Directory (AD) to provide user authentication and optionally authorization. Using AD for authentication only means the user must exist within Open-AudIT and AD is used to simply verify the user’s username and password. Find out how by reading this blog

Blog Articles Icon - Gradient

One thing organisations have in common is the need for more flexibility in the authentication system to give them the ability to provide access to resources being managed by the people who need to see them, to find our more read this blog.

Blog Articles Icon - Gradient

Having an Open-Source core is very important, the ability to generate large amounts of data for customers, allowing for customisation to the programs and most relevant to the current article, the ability to integrate with as much as possible.

Video How-To's

Webinars Icon - Gradient

Open-AudIT has a granular permissions system to determine what a user within Open-AudIT can do, and the items he can do it too. Open-AudIT can be entirely self-contained, or use Active Directory or OpenLDAP for authentication and/or authorization. This video will show you how.

Webinars Icon - Gradient

Join Mark Henry as he introduces some key features that can go unnoticed that will really help your network management, including authentication setup and troubleshooting.

Webinars Icon - Gradient

Join Mark Henry as he discusses more advanced topics surrounding NMIS, this webinar will be really in-depth and very valuable to your organization.

I’m ready to talk with the experts

“I need to be able to “lock out” content from certain users and/or customers within my UI, in a way that is easy to integrate with our current AD profiling system.”

– This was solved with NMIS and opCharts.

 

Book your demo today and start solving your network problems

REQUEST A DEMO

Pin It on Pinterest