In addition to local user management, the allows you to authenticate remote users using the following supported providers:
For these remote users to operate the system, you must configure their access level permissions by mapping their remote Group (in the case of AD) or Class (in the case of RADIUS) to the desired SBC access level. This mapping configuration will dictate the -based permissions for your remotely authenticated users:
Remote users are not stored on the system, instead they live on the remote authentication providers. Remote user authentication happens over the network with the appropriate external provider which is transparent to the user.