Authentication servers and authorization servers must be configured using configuration files.
Configuration files can be created for LDAP, RADIUS, and Kerberos authentication protocols.
Authentication servers and authorization servers must be configured using configuration files.