Authentication is the process of verifying that a user is who he says he is. Once a user is authenticated, the user's group is used to determine his system and port permissions. The user's assigned privileges determine what type of access is allowed. This is called authorization.
When the KX III is configured for remote authentication, the external authentication server is used primarily for the purposes of authentication, not authorization.
If you are using a tiered configuration in which a base KX III device is used to access multiple other tiered devices, the base device and the tiered devices must using the same authentication settings.
From the Authentication Settings page you can configure the type of authentication used for access to your KX III.
Note: When remote authentication (LDAP/LDAPS or RADIUS) is selected, if the user is not found, the local authentication database will also be checked.