05-19-2008 07:00 AM - edited 03-10-2019 03:51 PM
Hi,
We have integrated Acs 4.1se with windows active directory.now we need to give certain users full privige to some client devices and only show level privilege to some devices.what is the neccessary steps required in ACS and ACS clients.Also how much time the dynamic users will remain in ACSthanks in advance
Solved! Go to Solution.
05-20-2008 06:23 AM
Also in acs one user or aaa-client can't be a part of more then one group.
Regards,
~JG
05-19-2008 07:30 AM
Command authorization will work only with TACACS and not with Radius. If you are using tacacs then checkout this link,
If you want to pass only the privilege level then we need to pass via av pair. See the attachment.
Dynamic user will stay till the time you manually remove it.
Regards,
~JG
Do rate helpful posts
05-20-2008 12:22 AM
Thaks alot for the link.we are using tacacs only.
Is it possible for a user to be a part of more than one usergroup and client device to be part of more than one Network device group?
05-20-2008 03:30 AM
Hi
I forgot to add one more query
After configuring neccessary steps in ACS for command authorization ,I am not able to to get into enable mode for Priv level 1 user.(read only access).I set priv level 1 under TACACS+ settings section,Because i want to give only show access(all show commands) to certain devices
Following error recived for enable command in router
Command authorization failed.
For read& write access it is working fine.these r the configuration in router
aaa authorization config-commands
aaa authorization commands 0 default group tacacs+ local
aaa authorization commands 1 default group tacacs+ local
aaa authorization commands 15 default group tacacs+ local
05-20-2008 06:18 AM
Hi,
If you are using command authorization then privilage doesn't matter.
Best way to set it up is to give all user priv lvl 15 and then define what all commands user can execute.
Note : Having priv 15 does not mean that user will able to issue all commands.
We will set up command authorization on acs to have control on users.
This is how your config should look,
aaa authentication login default group tacacs+ local
aaa authorization exec default group tacacs+ if-authenticated
aaa authorization commands 1 default group tacacs+ if-authenticated
aaa authorization commands 15 default group tacacs+ if-authenticated
aaa authorization config-commands
aaa accounting commands 1 default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+
Check out this link
Regards,
~JG
05-20-2008 06:23 AM
Also in acs one user or aaa-client can't be a part of more then one group.
Regards,
~JG
05-20-2008 07:54 AM
Thanks very much Jgambhir,Now it is working fine
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide