Configure AAA Authorization for Roles
Authorization services determine if the user has permission to use a command in the CLI. Users with only privilege levels can use
commands in privilege-or-role mode (the default) provided their privilege level is the same or greater than the privilege level of those
commands. Users with defined roles can use commands provided their role is permitted to use those commands. Role inheritance is also
used to determine authorization.
Users with roles and privileges are authorized with the same mechanism. There are six methods available for authorization:
radius
,
,
local
,
enable
,
line
, and
none
.
When role-based only AAA authorization is enabled, the
enable
,
line
, and
none
methods are not available. Each of these three
methods allows users to be authorized with either a password that is not specific to their userid or with no password at all. Because of the
lack of security, these methods are not available for role-based only mode.
To configure AAA authorization, use the
aaa authorization exec
command in CONFIGURATION mode. The
aaa
authorization exec
command determines which CLI mode the user will start in for their session; for example, Exec mode or Exec
Privilege mode. For information about how to configure authentication for roles, see
Configure AAA Authentication for Roles.
aaa authorization exec {
method-list-name
| default}
method
[…
method4
]
You can further restrict users’ permissions, using the
aaa authorization command
command in CONFIGURATION mode.
aaa authorization command {
method-list-name
| default}
method
[…
method4
]
Examples of Applying a Method List
The following configuration example applies a method list: , RADIUS and local:
!
radius-server host 10.16.150.203 key <clear-text>
!
tacacs-server host 10.16.150.203 key <clear-text>
!
aaa authentication login ucraaa radius local
aaa authorization exec ucraaa radius local
aaa accounting commands role netadmin ucraaa start-stop
!
The following configuration example applies a method list other than default to each VTY line.
NOTE:
Note that the methods were not applied to the console so the default methods (if configured) are applied there.
!
line console 0
exec-timeout 0 0
line vty 0
login authentication ucraaa
authorization exec ucraaa
accounting commands role netadmin ucraaa
line vty 1
login authentication ucraaa
authorization exec ucraaa
accounting commands role netadmin ucraaa
line vty 2
login authentication ucraaa
authorization exec ucraaa
accounting commands role netadmin ucraaa
line vty 3
login authentication ucraaa
authorization exec ucraaa
accounting commands role netadmin ucraaa
line vty 4
828
Security
Содержание S4048T-ON
Страница 1: ...Dell Configuration Guide for the S4048 ON System 9 11 2 1 ...
Страница 148: ...Figure 10 BFD Three Way Handshake State Changes 148 Bidirectional Forwarding Detection BFD ...
Страница 251: ...Dell Control Plane Policing CoPP 251 ...
Страница 363: ... RPM Synchronization GARP VLAN Registration Protocol GVRP 363 ...
Страница 511: ...Figure 64 Inspecting the LAG Configuration Link Aggregation Control Protocol LACP 511 ...
Страница 512: ...Figure 65 Inspecting Configuration of LAG 10 on ALPHA 512 Link Aggregation Control Protocol LACP ...
Страница 515: ...Figure 67 Inspecting a LAG Port on BRAVO Using the show interface Command Link Aggregation Control Protocol LACP 515 ...
Страница 516: ...Figure 68 Inspecting LAG 10 Using the show interfaces port channel Command 516 Link Aggregation Control Protocol LACP ...
Страница 558: ...Figure 84 Configuring Interfaces for MSDP 558 Multicast Source Discovery Protocol MSDP ...
Страница 559: ...Figure 85 Configuring OSPF and BGP for MSDP Multicast Source Discovery Protocol MSDP 559 ...
Страница 560: ...Figure 86 Configuring PIM in Multiple Routing Domains 560 Multicast Source Discovery Protocol MSDP ...
Страница 564: ...Figure 88 MSDP Default Peer Scenario 2 564 Multicast Source Discovery Protocol MSDP ...
Страница 565: ...Figure 89 MSDP Default Peer Scenario 3 Multicast Source Discovery Protocol MSDP 565 ...
Страница 729: ...protocol spanning tree pvst no disable vlan 300 bridge priority 4096 Per VLAN Spanning Tree Plus PVST 729 ...
Страница 841: ...Figure 115 Single and Double Tag TPID Match Service Provider Bridging 841 ...
Страница 842: ...Figure 116 Single and Double Tag First byte TPID Match 842 Service Provider Bridging ...