Tripp Lite B0930042E4UV Owners Manual for B093- B097- and B098-Series Console - Page 174

RADIUS/TACACS User Configuration

Page 174 highlights

9. Authentication • Enter the Server Password. • Click Apply. LDAP remote authentication will now be used for all user access to the console server and serially or network attached devices. LDAP The Lightweight Directory Access Protocol (LDAP) is based on the X.500 standard, but is significantly simpler and more readily adapted to meet custom needs. The core LDAP specifications are all defined in RFCs. LDAP is a protocol used to access information stored in an LDAP server. Further information on configuring remote RADIUS servers can be found at the following websites: http://www.ldapman.org/articles/intro_to_ldap.html http://www.ldapman.org/servers.html http://www.linuxplanet.com/linuxplanet/tutorials/5050/1/ http://www.linuxplanet.com/linuxplanet/tutorials/5074/4/ 9.1.5 RADIUS/TACACS User Configuration Users may be added to the local console server. If they are not added and they log in via remote AAA, a user will be added for them. This user will not show up in the Tripp Lite configurators unless they are specifically added, at which point they are transformed into a local user. The newly added user must authenticate using the remote AAA server and will have no access if it is down. If a local user logs in, they may be authenticated/authorized from the remote AAA server, depending on the chosen priority of the remote AAA. A local user's authorization is the union of local and remote privileges. Example 1: User Tim is locally added and has access to ports 1 and 2. He is also defined on a remote TACACS server, which says he has access to ports 3 and 4. Tim may log in with either his local or TACACS password, and will have access to ports 1 through 4. If TACACS is down, he will need to use his local password, and will only be able to access ports 1 and 2. Example 2: User Sue is only defined on the TACACS server, which says she has access to ports 5 and 6. When she attempts to log in, a new user will be created for her and she will be able to access ports 5 and 6. If the TACACS server is down, she will have no access. Example 3: User Paul is defined on a RADIUS server only. He has access to all serial ports and network hosts. Example 4: User Don is locally defined on an appliance using RADIUS for AAA. Even if Don is also defined on the RADIUS server, he will only have access to those serial ports and network hosts he has been authorized to use on the appliance. If a "no local AAA" option is selected, the root will still be authenticated locally. Remote users may be added to the administrator group via RADIUS or TACACS. Users may have a set of authorizations set on the remote TACACS server. Users automatically added by RADIUS will have authorization for all resources, whereas those added locally will still need their authorizations specified. LDAP has not been modified and will still need locally defined users. Note: To interact with RADIUS, TACACS+ and LDAP with console server firmware pre-2.4.2, you must also set up the user accounts on the local console server. All resource authorizations must be added to the local appliance. With this release, if remote AAA is selected, it is used for password checking only. Root is always authenticated locally. Any changes to PAM configurations will be destroyed the next time the authentication configurator is run. 174

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288

174
• Enter the
Server Password
.
• Click
Apply
. LDAP remote authentication will now be used for all user access to the console server and serially or network
attached devices.
LDAP
The Lightweight Directory Access Protocol (LDAP) is based on the X.500 standard, but is significantly simpler and
more readily adapted to meet custom needs. The core LDAP specifications are all defined in RFCs. LDAP is a
protocol used to access information stored in an LDAP server. Further information on configuring remote RADIUS
servers can be found at the following websites:
9.1.5 RADIUS/TACACS User Configuration
Users may be added to the local console server. If they are not added and they log in via remote AAA, a user will be added
for them. This user will not show up in the Tripp Lite configurators unless they are specifically added, at which point they are
transformed into a local user. The newly added user must authenticate using the remote AAA server and will have no access if
it is down.
If a local user logs in, they may be authenticated/authorized from the remote AAA server, depending on the chosen priority of
the remote AAA. A local user’s authorization is the union of local and remote privileges.
Example 1:
User Tim is locally added and has access to ports 1 and 2. He is also defined on a remote TACACS server, which says he has
access to ports 3 and 4. Tim may log in with either his local or TACACS password, and will have access to ports 1 through 4.
If TACACS is down, he will need to use his local password, and will only be able to access ports 1 and 2.
Example 2:
User Sue is only defined on the TACACS server, which says she has access to ports 5 and 6. When she attempts to log in, a
new user will be created for her and she will be able to access ports 5 and 6. If the TACACS server is down, she will have no
access.
Example 3:
User Paul is defined on a RADIUS server only. He has access to all serial ports and network hosts.
Example 4:
User Don is locally defined on an appliance using RADIUS for AAA. Even if Don is also defined on the RADIUS server, he will
only have access to those serial ports and network hosts he has been authorized to use on the appliance.
If a “no local AAA” option is selected, the root will still be authenticated locally.
Remote users may be added to the administrator group via RADIUS or TACACS. Users may have a set of authorizations set
on the remote TACACS server. Users automatically added by RADIUS will have authorization for all resources, whereas those
added locally will still need their authorizations specified.
LDAP has not been modified and will still need locally defined users.
Note:
To interact with RADIUS, TACACS+ and LDAP with console server firmware pre-2.4.2, you must also set up the user accounts on the
local console server. All resource authorizations must be added to the local appliance. With this release, if remote AAA is selected, it is used
for password checking only. Root is always authenticated locally. Any changes to PAM configurations will be destroyed the next time the
authentication configurator is run.
9. Authentication