HP 6125XLG R2306-HP 6125XLG Blade Switch Fundamentals Configuration Guide - Page 57

Assigning user roles to non-AAA authentication users on user interfaces

Page 57 highlights

Step Command 3. Authorize the user to have a authorization-attribute user-role user role. role-name Remarks Repeat this step to assign the user to up to 64 user roles. By default, network-operator is assigned to local users created by a network-admin user or level-15 user. Assigning user roles to non-AAA authentication users on user interfaces Specify user roles for the following two types of login users on the user interfaces: • Users that use password authentication or no authentication. • SSH clients that use publickey or password-publickey authentication. User roles assigned to these SSH clients are specified in their respective local device management user accounts. For more information about user interfaces, see "Login overview" and "Logging in to the CLI." For more information about SSH, see Security Configuration Guide. To assign a user role to non-AAA authentication users on a user interface: Step 1. Enter system view. 2. Enter user interface view. Command system-view user-interface { first-num1 [ last-num1 ] | { aux | vty } first-num2 [ last-num2 ] } 3. Specify a user role on the user interface. user-role role-name Remarks N/A N/A Repeat this step to specify up to 64 user roles on a user interface. By default, network-admin is specified on the AUX user interface, and network-operator is specified on any other user interface. The device does not assign the security-audit user role to the users who are logged in to the device through the current user interface. Configuring temporary user role authorization Temporary user role authorization allows you to obtain a temporary user role without reconnecting to the device. This function is useful when you want to use a user role temporarily to configure a feature. Temporary user role authorization is effective only on the current login. It does not change the user role settings in the user account that you have been logged in with. The next time you are logged in with the user account, the original user role settings take effect. 50

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155

50
Step
Command
Remarks
3.
Authorize the user to have a
user role.
authorization-attribute user-role
role-name
Repeat this step to assign the user to up
to 64 user roles.
By default, network-operator is
assigned to local users created by a
network-admin user or level-15 user.
Assigning user roles to non-AAA authentication users on user
interfaces
Specify user roles for the following two types of login users on the user interfaces:
Users that use password authentication or no authentication.
SSH clients that use publickey or password-publickey authentication. User roles assigned to these
SSH clients are specified in their respective local device management user accounts.
For more information about user interfaces, see "
Login overview
" and "
Logging in to the CLI
." For more
information about SSH, see
Security Configuration Guide
.
To assign a user role to non-AAA authentication users on a user interface:
Step
Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enter user interface view.
user-interface
{
first-num1
[
last-num1
] | {
aux
|
vty
}
first-num2
[
last-num2
] }
N/A
3.
Specify a user role on the
user interface.
user-role
role-name
Repeat this step to specify up to 64
user roles on a user interface.
By default, network-admin is specified
on the AUX user interface, and
network-operator is specified on any
other user interface.
The device does not assign the
security-audit user role to the users
who are logged in to the device
through the current user interface.
Configuring temporary user role authorization
Temporary user role authorization allows you to obtain a temporary user role without reconnecting to the
device. This function is useful when you want to use a user role temporarily to configure a feature.
Temporary user role authorization is effective only on the current login. It does not change the user role
settings in the user account that you have been logged in with. The next time you are logged in with the
user account, the original user role settings take effect.