Cisco Support Community
cancel
Showing results for 
Search instead for 
Did you mean: 
Announcements

Welcome to Cisco Support Community. We would love to have your feedback.

For an introduction to the new site, click here. And see here for current known issues.

New Member

Different privelege level for Active directory users

Hi,

We have integrated Acs 4.1se with windows active directory.now we need to give certain users full privige to some client devices and only show level privilege to some devices.what is the neccessary steps required in ACS and ACS clients.Also how much time the dynamic users will remain in ACSthanks in advance

1 ACCEPTED SOLUTION

Accepted Solutions

Re: Different privelege level for Active directory users

Also in acs one user or aaa-client can't be a part of more then one group.

Regards,

~JG

6 REPLIES

Re: Different privelege level for Active directory users

Command authorization will work only with TACACS and not with Radius. If you are using tacacs then checkout this link,

http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_configuration_example09186a00808d9138.shtml

If you want to pass only the privilege level then we need to pass via av pair. See the attachment.

Dynamic user will stay till the time you manually remove it.

Regards,

~JG

Do rate helpful posts

New Member

Re: Different privelege level for Active directory users

Thaks alot for the link.we are using tacacs only.

Is it possible for a user to be a part of more than one usergroup and client device to be part of more than one Network device group?

New Member

Re: Different privelege level for Active directory users

Hi

I forgot to add one more query

After configuring neccessary steps in ACS for command authorization ,I am not able to to get into enable mode for Priv level 1 user.(read only access).I set priv level 1 under TACACS+ settings section,Because i want to give only show access(all show commands) to certain devices

Following error recived for enable command in router

Command authorization failed.

For read& write access it is working fine.these r the configuration in router

aaa authorization config-commands

aaa authorization commands 0 default group tacacs+ local

aaa authorization commands 1 default group tacacs+ local

aaa authorization commands 15 default group tacacs+ local

Re: Different privelege level for Active directory users

Hi,

If you are using command authorization then privilage doesn't matter.

Best way to set it up is to give all user priv lvl 15 and then define what all commands user can execute.

Note : Having priv 15 does not mean that user will able to issue all commands.

We will set up command authorization on acs to have control on users.

This is how your config should look,

aaa authentication login default group tacacs+ local

aaa authorization exec default group tacacs+ if-authenticated

aaa authorization commands 1 default group tacacs+ if-authenticated

aaa authorization commands 15 default group tacacs+ if-authenticated

aaa authorization config-commands

aaa accounting commands 1 default start-stop group tacacs+

aaa accounting commands 15 default start-stop group tacacs+

Check out this link

http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_configuration_example09186a00808d9138.shtml

Regards,

~JG

Re: Different privelege level for Active directory users

Also in acs one user or aaa-client can't be a part of more then one group.

Regards,

~JG

New Member

Re: Different privelege level for Active directory users

Thanks very much Jgambhir,Now it is working fine

229
Views
5
Helpful
6
Replies