Tripp Lite B098016V Owners Manual for B093- B097- and B098-Series Console Serv - Page 178

Remote Groups with TACACS+ Authentication

Page 178 highlights

9. Authentication Note: When using remote groups with LDAP remote authorization, you need to have corresponding local groups on the console server. However, where the LDAP group names can contain upper case and space characters, the local group name on the console server must be all lower case and the spaces replaced with underscores. For example, a remote group on the LDAP server may be My Ldap Access Group needs a corresponding local group on the console server called my_ldap_access_group (both without the single quotes). The local group on the console server must specify what the group member is granted access to for any group membership to be effective. 9.1.9 Remote Groups with TACACS+ Authentication When using TACACS+ authentication, there are two ways to grant a remotely authenticated user privileges. The first is to set the priv-lvl and port attributes of the raccess service to 12 (refer to 9.2 PAM for more information). Group names can also be provided to the console server using the groupname custom attribute of the raccess service. An example Linux tac-plus config snippet might look like: user = myuser { service = raccess { groupname="users" groupname1="routers" groupname2="dracs" } } You may also specify multiple groups in one comma-delimited (e.g., groupname="users,routers,dracs"), but be aware that the maximum length of the attribute value string is 255 characters. To use an attribute name other than groupname, set Authentication -> TACACS+ -> TACACS Group Membership Attribute. 178

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288

178
Note:
When using remote groups with LDAP remote authorization, you need to have corresponding local groups on the console server.
However, where the LDAP group names can contain upper case and space characters, the local group name on the console server must be
all lower case and the spaces replaced with underscores. For example, a remote group on the LDAP server may be
My Ldap Access Group
needs a corresponding local group on the console server called
my_ldap_access_group
(both without the single quotes). The local group
on the console server must specify what the group member is granted access to for any group membership to be effective.
9.1.9 Remote Groups with TACACS+ Authentication
When using TACACS+ authentication, there are two ways to grant a remotely authenticated user privileges. The first is to set
the priv-lvl and port attributes of the raccess service to 12 (refer to
9.2 PAM
for more information). Group names can also be
provided to the console server using the groupname custom attribute of the raccess service.
An example Linux tac-plus config snippet might look like:
user = myuser {
service = raccess {
groupname=”users”
groupname1=”routers”
groupname2=”dracs”
}
}
You may also specify multiple groups in one comma-delimited (e.g.,
groupname=”users,routers,dracs”
), but be aware that
the maximum length of the attribute value string is 255 characters.
To use an attribute name other than
groupname
, set
Authentication -> TACACS+ -> TACACS Group Membership
Attribute
.
9. Authentication