Lantronix SLP 8 Lantronix SLP - User Guide - Page 87

To display LDAP Group access

Page 87 highlights

4: Advanced Operations The Add PortToLDAP command grants an LDAP group access to the serial port. To grant serial port access to an LDAP group: 1. At the command prompt, type add porttoldap console and a group name. Press Enter. Deleting serial port access for an LDAP group The Delete PortFromLDAP command removes an LDAP group's access to the serial port. You cannot remove access to the serial port for an administrative level group. To delete serial port access for an LDAP group: 1. At the command prompt, type delete portfromldap console and a group name. Press Enter. Displaying LDAP Group access The List LDAPGroup command displays all access rights for an LDAP group. To display LDAP Group access: At the command prompt, type list ldapgroup, optionally followed by a group name. Press Enter. Example The following command displays information about the LDAP group PowerUser: SLP: list ldapgroup poweruser Username: PowerUser Outlet Outlet ID Name .A1 DataServer_1 .A2 WebServer_1 Groups: ServerGroup_1 ServerGroup_2 More [Y/es N/o]: Y Ports: Port Port ID Name Console Console TACACS+ The SLP family of products supports the Terminal Access Controller Access Control System (TACACS+) protocol. This enables authentication and authorization with a central TACACS+ server; user accounts do not need to be individually created locally on each SLP device. This allows administrators to pre-define and configure (in each SLP product, and in the TACACS+ server) a set of necessary TACACS+ privilege levels, and users access rights for each. User's access rights can then be assigned or revoked simply by making the user a member of one-or-more pre-defined SLP TACACS+ privilege levels. User account rights can be added, deleted, or changed within TACACS+ without any changes needed on individual SLP products. The SLP supports 16 different TACACS+ privilege levels; 15 are entirely configurable by the system administrator (1 is reserved for default Admin level access to all SLP resources). SecureLinx SLP Remote Power Manager 86

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109

4: Advanced Operations
The Add PortToLDAP command grants an LDAP group access to the serial port.
To grant serial port access to an LDAP group:
1.
At the command prompt, type
add porttoldap console
and a group name
.
Press
Enter.
Deleting serial port access for an LDAP group
The Delete PortFromLDAP command removes an LDAP group’s access to the serial
port. You cannot remove access to the serial port for an administrative level group.
To delete serial port access for an LDAP group:
1.
At the command prompt, type
delete portfromldap console
and a group
name
.
Press
Enter.
Displaying LDAP Group access
The List LDAPGroup command displays all access rights for an LDAP group.
To display LDAP Group access:
At the command prompt, type
list ldapgroup,
optionally followed by a
group
name. Press
Enter.
Example
The following command displays information about the LDAP group PowerUser:
SLP: list ldapgroup poweruser<Enter>
Username: PowerUser
Outlet
Outlet
ID
Name
.A1
DataServer_1
.A2
WebServer_1
Groups:
ServerGroup_1
ServerGroup_2
More [Y/es N/o]: Y
Ports:
Port
Port
ID
Name
Console
Console
TACACS+
The SLP family of products supports the Terminal Access Controller Access Control
System (TACACS+) protocol.
This enables authentication and authorization with a
central TACACS+ server; user accounts do not need to be individually created locally
on each SLP device.
This allows administrators to pre-define and configure (in each SLP product, and in
the TACACS+ server) a set of necessary TACACS+ privilege levels, and users
access rights for each.
User’s access rights can then be assigned or revoked
simply by making the user a member of one-or-more pre-defined SLP TACACS+
privilege levels.
User account rights can be added, deleted, or changed within
TACACS+
without any changes needed on individual SLP products.
The SLP supports 16 different TACACS+ privilege levels; 15 are entirely
configurable by the system administrator (1 is reserved for default Admin level
access to all SLP resources).
SecureLinx SLP Remote Power Manager
86