26
authorization when the RADIUS server is invalid. The device does not perform authorization when
both of the previous methods are invalid.
Examples
# In ISP domain
test
, perform local authorization for ADVPN users.
<Sysname> system-view
[Sysname] domain test
[Sysname-isp-test] authorization advpn local
# In ISP domain
test
, perform RADIUS authorization for ADVPN users based on scheme
rd
and use
local authorization as the backup.
<Sysname> system-view
[Sysname] domain test
[Sysname-isp-test] authorization advpn radius-scheme rd local
Related commands
authorization default
local-user
radius scheme
authorization command
Use
authorization command
to specify the command authorization method.
Use
undo authorization command
to restore the default.
Syntax
In non-FIPS mode:
authorization command
{
hwtacacs-scheme
hwtacacs-scheme-name
[
local
] [
none
] |
local
[
none
] |
none
}
undo authorization command
In FIPS mode:
authorization command
{
hwtacacs-scheme
hwtacacs-scheme-name
[
local
] |
local
}
undo authorization command
Default
The default authorization method of the ISP domain is used for command authorization.
Views
ISP domain view
Predefined user roles
network-admin
Parameters
hwtacacs-scheme hwtacacs-scheme-name
: Specifies an HWTACACS scheme by its name, a
case-insensitive string of 1 to 32 characters.
local
: Performs local authorization.
none
: Does not perform authorization. The authorization server does not verify whether the entered
commands are permitted by the user role. The commands are executed successfully if the user role
has permission to the commands.