Assigning User Roles To Non-Aaa Authentication Users On User Interfaces; Configuring Temporary User Role Authorization - HP 6125XLG Configuration Manual

Blade switch fundamentals configuration guide
Table of Contents

Advertisement

Step
3.
Authorize the user to have a
user role.
Assigning user roles to non-AAA authentication users on user
interfaces
Specify user roles for the following two types of login users on the user interfaces:
Users that use password authentication or no authentication.
SSH clients that use publickey or password-publickey authentication. User roles assigned to these
SSH clients are specified in their respective local device management user accounts.
For more information about user interfaces, see
information about SSH, see Security Configuration Guide.
To assign a user role to non-AAA authentication users on a user interface:
Step
1.
Enter system view.
2.
Enter user interface view.
3.
Specify a user role on the
user interface.

Configuring temporary user role authorization

Temporary user role authorization allows you to obtain a temporary user role without reconnecting to the
device. This function is useful when you want to use a user role temporarily to configure a feature.
Temporary user role authorization is effective only on the current login. It does not change the user role
settings in the user account that you have been logged in with. The next time you are logged in with the
user account, the original user role settings take effect.
Command
authorization-attribute user-role
role-name
"Login
Command
system-view
user-interface { first-num1
[ last-num1 ] | { aux | vty }
first-num2 [ last-num2 ] }
user-role role-name
50
Remarks
Repeat this step to assign the user to up
to 64 user roles.
By default, network-operator is
assigned to local users created by a
network-admin user or level-15 user.
overview" and
"Logging in to the
Remarks
N/A
N/A
Repeat this step to specify up to 64
user roles on a user interface.
By default, network-admin is specified
on the AUX user interface, and
network-operator is specified on any
other user interface.
The device does not assign the
security-audit user role to the users
who are logged in to the device
through the current user interface.
CLI." For more

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents