Rbac Temporary User Role Authorization Configuration Example (Radius Authentication) - HP 5130 EI series Configuration Manual

Hide thumbs Also See for 5130 EI series:
Table of Contents

Advertisement

<Switch>
2.
Verify that you can obtain the level-3 user role:
# Use the super password to obtain the level-3 user role. When the system prompts for a username
and password, enter the username test@bbb and password enabpass.
<Switch> super level-3
Username: test@bbb
Password:
The following output shows that you have obtained the level-3 user role.
User privilege role is level-3, and only those commands that authorized to the role
can be used.
# If the ACS server does not respond, enter the local authentication password 654321 at the
prompt.
Invalid configuration or no response from the authentication server.
Change authentication mode to local.
Password:
User privilege role is level-3, and only those commands that authorized to the role
can be used.
The output shows that you have obtained the level-3 user role.
3.
Use the method in step
network-admin. (Details not shown.)
RBAC temporary user role authorization configuration example
(RADIUS authentication)
Network requirements
As shown in
192.168.1.58. The Telnet user uses the username test@bbb and is assigned the user role level-0.
Configure the remote-then-local authentication mode for temporary user role authorization. The switch
uses the RADIUS server to provide authentication for the network-admin user role. If the AAA
configuration is invalid or the RADIUS server does not respond, the switch performs local authentication.
Figure 29 Network diagram
Configuration procedure
1.
Configure the switch:
2
to verify that you can obtain the user roles level 0, level 1, level 2, and
Figure
29, the switch uses local authentication for login users, including the Telnet user at
68

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents