How to assign privilege levels with TACACS+.

Unanswered Question
  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 5 (3 ratings)
Loading.
royalblues Thu, 07/03/2008 - 06:22

For shell authorization to work, the users shoudl be asigned a privilege level of 15 but their access can be restricted to certain commands

IN your case you need to define a group which require similar sets of privileges and then assign the restricted shell authorization set to this group.

Have a look at the attached file

Narayan

Jagdeep Gambhir Thu, 07/03/2008 - 12:47

That is for enable privilege. Best way to set it up is to give all user priv lvl 15 and then define what all commands user can execute.

Note : Having priv 15 does not mean that user will able to issue all commands.

We will set up command authorization on acs to have control on users.

This is how your config should look,

aaa authentication login default group tacacs+ local

aaa authorization exec default group tacacs+ if-authenticated

aaa authorization commands 1 default group tacacs+ if-authenticated

aaa authorization commands 15 default group tacacs+ if-authenticated

aaa authorization config-commands

aaa accounting commands 1 default start-stop group tacacs+

aaa accounting commands 15 default start-stop group tacacs+

http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_configuration_example09186a00808d9138.shtml

Regards,

~JG

Do rate helpful posts

Actions

This Discussion