In the following example the command protocol permissions are reset to their original setting or one or more of the system-defined roles
and any roles that inherited permissions from them.
Dell(conf)#role configure reset protocol
Adding and Deleting Users from a Role
To create a user name that is authenticated based on a user role, use the
username
name
password
encryption-type
password
role
role-name
command in CONFIGURATION mode.
Example
The following example creates a user name that is authenticated based on a user role.
Dell (conf) #username john password 0 password role secadmin
The following example deletes a user role.
NOTE:
If you already have a user ID that exists with a privilege level, you can add the user role to username that has a privilege
Dell (conf) #no username john
The following example adds a user, to the secadmin user role.
Dell (conf)#username john role secadmin password 0 password
AAA Authentication and Authorization for Roles
This section describes how to configure AAA Authentication and Authorization for Roles.
Configuration Task List for AAA Authentication and Authorization for Roles
This section contains the following AAA Authentication and Authorization for Roles configuration tasks:
•
Configuring AAA Authentication for Roles
•
Configuring AAA Authorization for Roles
•
Configuring and RADIUS VSA Attributes for RBAC
Configure AAA Authentication for Roles
Authentication services verify the user ID and password combination. Users with defined roles and users with privileges are authenticated
with the same mechanism. There are six methods available for authentication:
radius, , local, enable, line,
and
none
.
When role-based only AAA authorization is enabled, the
enable, line,
and
none
methods are not available. Each of these three methods
allows users to be verified with either a password that is not specific to their user ID or with no password at all. Because of the lack of
security these methods are not available for role only mode. When the system is in role-only mode, users that have only privilege levels are
denied access to the system because they do not have a role. For information about role only mode, see
Configuring Role-based Only AAA
NOTE:
Authentication services only validate the user ID and password combination. To determine which commands are permitted
for users, configure authorization. For information about how to configure authorization for roles, see
To configure AAA authentication, use the
aaa authentication
command in CONFIGURATION mode.
aaa authentication login {
method-list-name
| default}
method
[…
method4
]
Security
731
Summary of Contents for S3048-ON
Page 1: ...Dell Configuration Guide for the S3048 ON System 9 11 2 5 ...
Page 137: ...0 Gi 1 1 Gi 1 2 rx Flow N A N A 0 0 No N A N A yes Access Control Lists ACLs 137 ...
Page 142: ...Figure 10 BFD Three Way Handshake State Changes 142 Bidirectional Forwarding Detection BFD ...
Page 241: ...Dell Control Plane Policing CoPP 241 ...
Page 287: ... RPM Synchronization GARP VLAN Registration Protocol GVRP 287 ...
Page 428: ...Figure 53 Inspecting the LAG Configuration 428 Link Aggregation Control Protocol LACP ...
Page 477: ...Figure 73 Configuring Interfaces for MSDP Multicast Source Discovery Protocol MSDP 477 ...
Page 478: ...Figure 74 Configuring OSPF and BGP for MSDP 478 Multicast Source Discovery Protocol MSDP ...
Page 483: ...Figure 77 MSDP Default Peer Scenario 2 Multicast Source Discovery Protocol MSDP 483 ...
Page 484: ...Figure 78 MSDP Default Peer Scenario 3 484 Multicast Source Discovery Protocol MSDP ...
Page 745: ...Figure 104 Single and Double Tag TPID Match Service Provider Bridging 745 ...
Page 746: ...Figure 105 Single and Double Tag First byte TPID Match 746 Service Provider Bridging ...