TACACS+ Authentication Manager Help >> Get Started

Get Started

Identity authentication is adopted for access control on the network. The implementation requires collaboration between TAM and the device.
This example describes the configuration procedure for device users with Telnet login.

Configure TAM

  1. Add a device to TAM.
  2. Add an authorization policy in TAM.
  3. Add a device user in TAM, and subscribe to the authorization policy configured in step 2 for the device user or device user group.
  4. Configure the TACACS scheme, domain, and authentication mode on the device.
  5. On the terminal PC, Telnet to the device. Initiate authentication using the username of the device user that has been added to TAM.
    With the previous configuration, the user can manage the device after passing authentication. The following describes the purpose and the key configuration of each step.

Add a device to TAM

Add an authorization policy in TAM

Add a device user to TAM

Configure the TACACS scheme, domain, and authentication mode on the device

Manage the device at the CLI on the PC

Scenario-Based Authorization Policy

You can specify multiple authorization rules for an authorization policy. Each authorization rule corresponds to one scenario. TAM authorizes the device users different privileges after the device users pass the authentication in different scenarios. The scenarios include device area, device type, and authorized time range. Authorization rules include shell profiles and command sets.

Device Area Management

Device Type Management

Authorized Time Range Policy Management

Shell Profile Configuration

Command Set Configuration

User-Based Authorization Policy

In TAM, a group of similar device users can be assigned the same authorization policy to obtain the same set of authorization attributes. For example, if administrators of a company can manage all devices located in different regions, you can assign the administrators the authorization policy that includes the most management privileges among all authorization policies.

Related Topics