Configuring Context-Level Administrative Users; Configuring Context-Level Security Administrators; Configuring Context-Level Administrators - Cisco ASR 5500 Administration Manual

Asr 5500 system administration guide, staros release 19
Table of Contents

Advertisement

Configuring Context-level Administrative Users

Important
Configuring Context-level Administrative Users
This user type is configured at the context-level and relies on the AAA subsystems for validating user names
and passwords during login. This is true for both administrative user accounts configured locally through a
configuration file or on an external RADIUS or TACACS+ server. Passwords for these user types are assigned
once and are accessible in the configuration file.
This section contains information and instructions for configuring context-level administrative user types.

Configuring Context-level Security Administrators

Use the example below to configure additional security administrators:
configure
context local
Notes:
• Additional keyword options are available that identify active administrators or place time thresholds on
• The nopassword option allows you to create an administrator without an associated password. Enable
Save the configuration as described in the Verifying and Saving Your Configuration chapter.

Configuring Context-level Administrators

Use the example below to configure context-level configuration administrators:
configure
context local
Notes:
• Additional keyword options are available that identify active administrators or place time thresholds on
• The nopassword option allows you to create a config-administrator without an associated password.
ASR 5500 System Administration Guide, StarOS Release 19
40
For information on the differences between these user privileges and types, refer to Getting Started.
administrator user_name { [ encrypted ] [ nopassword ] password password }
end
the administrator. Refer to the Command Line Interface Reference for more information about the
administrator command.
this option when using ssh public keys (authorized key command in SSH Configuration mode) as a
sole means of authentication. When enabled this option prevents someone from using an administrator
password to gain access to the user account.
config-administrator user_name { [ encrypted ] [ nopassword ] password password }
end
the administrator. Refer to the Command Line Interface Reference for more information about the
config-administrator command.
Enable this option when using ssh public keys (authorized key command in SSH Configuration mode)
System Settings

Advertisement

Table of Contents
loading

Table of Contents