Chapter 5 Setting Up and Managing Shared Profile Components
Command Authorization Sets
5-16
User Guide for Cisco Secure ACS for Windows Server
78-14696-01, Version 3.1
You can combine these expressions to specify absolute matching. In the example
given, you would use permit ^wid$ to ensure that only wid was permitted, and
not anywid or widget.
Command Authorization Sets Configuration
This section contains the following procedures:
•
Adding a Command Authorization Set, page 5-16
•
Editing a Command Authorization Set, page 5-19
•
Deleting a Command Authorization Set, page 5-20
Adding a Command Authorization Set
To add a command authorization set, follow these steps:
Step 1
In the navigation bar, click Shared Profile Components.
Result: The Shared Profile Components page lists the command authorization set
types available. These always include Shell Command Authorization Sets and
may include others, such as command authorization set types that support Cisco
device-management applications.
Step 2
Click one of the listed command authorization set types, as applicable.
Result: The selected Command Authorization Sets table appears.
Step 3
Click Add.
Result: The applicable Command Authorization Set page appears. Depending
upon the type of command authorization set you are adding, the contents of the
page vary. Below the Name and Description boxes, Cisco Secure ACS displays
either additional boxes or an expandable checklist tree. The expandable checklist
tree appears for device command set types that support a Cisco
device-management application.