In this chapter, you learn the following topics:
This chapter deals with the configuration of Access Control Server (ACS) to facilitate authentication to external databases, as well as the backup and restoration of ACS. In particular, the chapter covers the following:
External database configuration
Database group mappings
Unknown user policy
Database replication and backup
The following sections discuss each of these topics in further detail.
Different types of users exist ...