Fabric OS 5.2.x administrator guide
69
RADIUS configuration and admin domains
When configuring users with Admin Domains, you must also include the Admin Domain member list. This
section describes the way that you configure attribute types for this configuration.
The values for the new attribute types use the syntax
key=val[;key=val]
, where
key
is a text description of
attributes,
value
is the attribute value for the given key,
=
is the separator between key and value, and
;
is
an optional separator for multiple key-value pairs.
Multiple key-value pairs can appear for one Vendor-Type code. Key-value pairs with the same key name
may get concatenated across multiple Vendor-Type code. You can use any combination of the Vendor-Type
codes to specify key-value pairs. Note that a switch always parses these attributes from
Vendor-Type code
2
to Ve
ndor-Type code 4
.
Only two kinds of keys are accepted,
HomeAD
and
ADList
. All other keys are ignored.
•
HomeAD
is the designated home Admin Domain for the account. The valid value is between 0 to 255,
inclusive. The first valid HomeAD key-value pair is accepted by the switch, and any additional
HomeAD key-value pairs are ignored.
•
ADList
is a comma-separated list of Administrative Domain numbers to which this account is a
member. Valid numbers are between 0 to 255, inclusive. A dash between two numbers specifies a
range. Multiple ADList key-value pairs within the same or across the different Vendor-Type code are
concatenated. Multiple occurrence of the same AD number is ignored.
RADIUS authentication requires that the account have a valid role through the attribute type
Brocade-Auth-Role
. The additional attribute values ADList and HomeAD are optional. If they are
unspecified, the account can login with AD0 as its member list and home Admin Domain. If there is an
error in ADList or HomeAD specification, the account cannot login until the AD list is corrected; an error
message is displayed.
For example, on a Linux FreeRadius Server, the user (user-za) with the following settings takes the
“ZoneAdmin” role, with AD member list: 1, 2, 4, 5, 6, 7, 8, 9, 12; the Home Admin Domain will be 1.
user-za Auth-Type := Local, User-Password == "password"
Brocade-Auth-Role = "ZoneAdmin",
Brocade-AVPairs1 = "ADList=1,2,6,
Brocade-AVPairs2 = "ADList=4-8;ADList=7,9,12”
In the next example, on a Linux FreeRadius Server, the user takes the “Operator” role, with ADList 0 and
homeAD 0.
user-opr Auth-Type := Local, User-Password == "password"
Brocade-Auth-Role = "operator",
Brocade-AVPairs1 = "ADList=1,2;HomeAD=2",
Brocade-AVPairs2 = "ADList=-4-8,20;ADList=7,9,12",
Setting up RADIUS AAA service
Fabric OS 3.2, 4.4.0, and later support RADIUS Authentication, Authorization, and Accounting service
(AAA). When configured for RADIUS, a switch becomes a RADIUS client. In this configuration,
authentication records are stored in the RADIUS host server database. Login and logout account name,
assigned role, and time-accounting records are also stored on the RADIUS server for each user.
By default, RADIUS service is disabled, so AAA services default to the switch local database.
To enable RADIUS service, it is strongly recommended that you access the CLI through an SSH connection
so that the shared secret is protected. Multiple login sessions can configure simultaneously, and the last
session to apply a change leaves its configuration in effect. After a configuration is applied, it persists after
a reboot or an HA failover.
The configuration is chassis-based, so it applies to all logical switches (domains) on the switch and
replicates itself on a standby CP blade, if one is present. It is saved in a configuration upload and applied
in a configuration download.
You should configure at least two RADIUS servers so that if one fails, the other will assume service. You can
set the configuration with both RADIUS service and local authentication enabled so that if all RADIUS
Summary of Contents for AE370A - Brocade 4Gb SAN Switch 4/12
Page 18: ...18 ...
Page 82: ...82 Managing user accounts ...
Page 102: ...102 Configuring standard security features ...
Page 126: ...126 Maintaining configurations ...
Page 198: ...198 Routing traffic ...
Page 238: ...238 Using the FC FC routing service ...
Page 260: ...260 Administering FICON fabrics ...
Page 280: ...280 Working with diagnostic features ...
Page 332: ...332 Administering Extended Fabrics ...
Page 414: ...398 Configuring the PID format ...
Page 420: ...404 Configuring interoperability mode ...
Page 426: ...410 Understanding legacy password behaviour ...
Page 442: ...426 ...
Page 444: ......
Page 447: ......