HP 6125XLG R2306-HP 6125XLG Blade Switch Fundamentals Configuration Guide - Page 56

Assigning user roles to remote AAA authentication users

Page 56 highlights

Step 1. Enter system view. Command system-view 2. Enable the default user role function. role default-role enable Remarks N/A The default user role function is disabled. If the none authorization method is used for local users, you must enable the default user role function. Assigning user roles to remote AAA authentication users For remote AAA authentication users, user roles are configured on the remote authentication server. For information about configuring user roles for RADIUS users, see the RADIUS server documentation. For HWTACACS users, the role configuration must use the roles="role-1 role-2 ... role-n" format, where user roles are space separated. For example, configure roles="level-0 level-1 level-2" to assign level-0, level-1, and level-2 to an HWTACACS user. If the AAA server assigns the security-audit user role and other user roles to the same user, only the security-audit user role takes effect. NOTE: • To be compatible with privilege-based access control, the device automatically converts privilege-based user levels (0 to 15) assigned by an AAA server to RBAC user roles (level-0 to level-15). • If the AAA server assigns a privilege-based user level and a user role to a user, the user can use the collection of commands and resources accessible to both the user level and the user role. Assigning user roles to local AAA authentication users Configure user roles for local AAA authentication users in their local user accounts. Every local user has a default user role. If this default user role is not suitable, delete it. If the device has local users authorized the security-audit user role, you cannot delete the last local user who has that user role. The security-audit user role is mutually exclusive with other user roles. • When you assign the security-audit user role to a local user, the system asks for your confirmation to delete all the other user roles of the local user first. • When you assign the other user roles to a local user who has been assigned the security-audit user role, the system asks for your confirmation to delete the security-audit user role for the local user first. To assign a user role to a local user: Step 1. Enter system view. 2. Create a local user and enter local user view. Command system-view local-user user-name class { manage | network } Remarks N/A N/A 49

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155

49
Step
Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enable the default user role
function.
role default-role enable
The default user role function is
disabled.
If the
none
authorization method is
used for local users, you must enable
the default user role function.
Assigning user roles to remote AAA authentication users
For remote AAA authentication users, user roles are configured on the remote authentication server. For
information about configuring user roles for RADIUS users, see the RADIUS server documentation. For
HWTACACS users, the role configuration must use the
roles="
role-1 role-2 … role-n
"
format, where user
roles are space separated. For example, configure
roles="level-0 level-1 level-2"
to assign level-0, level-1,
and level-2 to an HWTACACS user.
If the AAA server assigns the security-audit user role and other user roles to the same user, only the
security-audit user role takes effect.
NOTE:
To be compatible with privilege-based access control, the device automatically converts privilege-based
user levels (0 to 15) assigned by an AAA server to RBAC user roles (level-0 to level-15).
If the AAA server assigns a privilege-based user level and a user role to a user, the user can use the
collection of commands and resources accessible to both the user level and the user role.
Assigning user roles to local AAA authentication users
Configure user roles for local AAA authentication users in their local user accounts. Every local user has
a default user role. If this default user role is not suitable, delete it.
If the device has local users authorized the security-audit user role, you cannot delete the last local user
who has that user role.
The
security-audit
user role is mutually exclusive with other user roles.
When you assign the security-audit user role to a local user, the system asks for your confirmation
to delete all the other user roles of the local user first.
When you assign the other user roles to a local user who has been assigned the security-audit user
role, the system asks for your confirmation to delete the security-audit user role for the local user first.
To assign a user role to a local user:
Step
Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Create a local user and
enter local user view.
local-user
user-name
class
{
manage
|
network
}
N/A