Configuring Authorization Settings On The Tacacs+ Server - Cisco GSS-4492R-K9 Administration Manual

Administration guide
Table of Contents

Advertisement

Chapter 4
Managing GSS User Accounts Through a TACACS+ Server

Configuring Authorization Settings on the TACACS+ Server

Note
OL-10410-01
Key—Enter the shared secret that the GSS and Cisco Secure ACS use to
authenticate transactions. For correct operation, you must specify the
identical shared secret on both the Cisco Secure ACS and the GSS. The key
is case-sensitive.
Authenticate Using—Select TACACS+ (Cisco IOS).
The TACACS+ (Cisco IOS) drop-down item is the general title for the
Note
Cisco TACACS+ authentication function. The TACACS+ (Cisco IOS)
selection activates the TACACS+ option when using Cisco Systems
access servers, routers, and firewalls that support the TACACS+
authentication protocol. This includes support with a GSS device as well.
You can use the TACACS+ server to limit user access to a subset of CLI
commands on a GSS device. For the Cisco Secure ACS, define the CLI command
sets for user groups, and then assign users to those groups. You can also determine
a user's primary GSSM GUI privilege level when configuring user command
authorization settings.
For the Cisco Secure ACS, you may also define command privileges for
individual users instead of an entire group. The setup process is the same for users
or for groups.
Configuring a TACACS+ Server for Use with the GSS
Cisco Global Site Selector Administration Guide
4-7

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents