
AAA Authentication and Authorization for Roles
This section describes how to configure AAA Authentication and Authorization for Roles.
Configuration Task List for AAA Authentication and Authorization for Roles
This section contains the following AAA Authentication and Authorization for Roles configuration tasks:
•
Configuring AAA Authentication for Roles
•
Configuring AAA Authorization for Roles
•
Configuring and RADIUS VSA Attributes for RBAC
Configure AAA Authentication for Roles
Authentication services verify the user ID and password combination. Users with defined roles and users with privileges are
authenticated with the same mechanism. There are six methods available for authentication:
radius, , local, enable, line,
and
none
.
When role-based only AAA authorization is enabled, the
enable, line,
and
none
methods are not available. Each of these three
methods allows users to be verified with either a password that is not specific to their user ID or with no password at all. Because of
the lack of security these methods are not available for role only mode. When the system is in role-only mode, users that have only
privilege levels are denied access to the system because they do not have a role. For information about role only mode, see
Configuring Role-based Only AAA Authorization.
NOTE: Authentication services only validate the user ID and password combination. To determine which commands are
permitted for users, configure authorization. For information about how to configure authorization for roles, see
Configure AAA Authorization for Roles.
To configure AAA authentication, use the
aaa authentication
command in CONFIGURATION mode.
aaa authentication login {
method-list-name
| default}
method
[…
method4
]
Configure AAA Authorization for Roles
Authorization services determine if the user has permission to use a command in the CLI. Users with only privilege levels can use
commands in privilege-or-role mode (the default) provided their privilege level is the same or greater than the privilege level of those
commands. Users with defined roles can use commands provided their role is permitted to use those commands. Role inheritance is
also used to determine authorization.
Users with roles and privileges are authorized with the same mechanism. There are six methods available for authorization:
radius
,
,
local
,
enable
,
line
, and
none
.
When role-based only AAA authorization is enabled, the
enable
,
line
, and
none
methods are not available. Each of these three
methods allows users to be authorized with either a password that is not specific to their userid or with no password at all. Because
of the lack of security, these methods are not available for role-based only mode.
To configure AAA authorization, use the
aaa authorization exec
command in CONFIGURATION mode. The
aaa
authorization exec
command determines which CLI mode the user will start in for their session; for example, Exec mode or
Exec Privilege mode. For information about how to configure authentication for roles, see
Configure AAA Authentication for Roles.
aaa authorization exec {
method-list-name
| default}
method
[…
method4
]
You can further restrict users’ permissions, using the
aaa authorization command
command in CONFIGURATION mode.
aaa authorization command {
method-list-name
| default}
method
[…
method4
]
Examples of Applying a Method List
766
Security
Summary of Contents for S4048-ON
Page 1: ...Dell Configuration Guide for the S4048 ON System 9 9 0 0 ...
Page 146: ...Figure 14 BFD Three Way Handshake State Changes 146 Bidirectional Forwarding Detection BFD ...
Page 522: ...Figure 87 Configuring Interfaces for MSDP 522 Multicast Source Discovery Protocol MSDP ...
Page 523: ...Figure 88 Configuring OSPF and BGP for MSDP Multicast Source Discovery Protocol MSDP 523 ...
Page 528: ...Figure 91 MSDP Default Peer Scenario 1 528 Multicast Source Discovery Protocol MSDP ...
Page 529: ...Figure 92 MSDP Default Peer Scenario 2 Multicast Source Discovery Protocol MSDP 529 ...
Page 530: ...Figure 93 MSDP Default Peer Scenario 3 530 Multicast Source Discovery Protocol MSDP ...
Page 633: ...Policy based Routing PBR 633 ...
Page 777: ...Figure 119 Single and Double Tag TPID Match Service Provider Bridging 777 ...
Page 778: ...Figure 120 Single and Double Tag First byte TPID Match 778 Service Provider Bridging ...