Configuring Privilege Level Support For Authorization On Tacacs+ Servers - Cisco Nexus 9000 Series Configuration Manual

Nx-os security configuration guide, release 9.x
Hide thumbs Also See for Nexus 9000 Series:
Table of Contents

Advertisement

Configuring Privilege Level Support for Authorization on TACACS+ Servers

2. terminal no verify-only [username username]
DETAILED STEPS
Command or Action
Step 1
terminal verify-only [username username]
Example:
switch# terminal verify-only
Step 2
terminal no verify-only [username username]
Example:
switch# terminal no verify-only
Configuring Privilege Level Support for Authorization on TACACS+ Servers
You can configure privilege level support for authorization on TACACS+ servers.
Unlike Cisco IOS devices, which use privilege levels to determine authorization, Cisco NX-OS devices use
role-based access control (RBAC). To enable both types of devices to be administered by the same TACACS+
servers, you can map the privilege levels configured on TACACS+ servers to user roles configured on Cisco
NX-OS devices.
When a user authenticates with a TACACS+ server, the privilege level is obtained and used to form a local
user role name of the format "priv-n," where n is the privilege level. The user assumes the permissions of this
local role. Sixteen privilege levels, which map directly to corresponding user roles, are available. The following
table shows the user role permissions that correspond to each privilege level.
Privilege Level
15
13 - 1
0
Note
When the feature privilege command is enabled, privilege roles inherit the permissions of lower level privilege
roles.
Note
You must also configure the privilege level for the Cisco NX-OS device on the Cisco Secure Access Control
Server (ACS).
Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x
94
Purpose
Enables command authorization verification. After you
enter this command, the Cisco NX-OS software indicates
whether the commands you enter are authorized or not.
Disables command authorization verification.
User Role Permissions
network-admin permissions
• Standalone role permissions, if the feature
privilege command is disabled.
• Same permissions as privilege level 0 with
cumulative privileges for roles, if the feature
privilege command is enabled.
Permission to execute show commands and exec
commands (such as ping, trace, and ssh).
Configuring TACACS+

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents