<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Tacacs+ Authorization in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/2039863#M184536</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;how to tell the Cisco Tacacs to only authorize users that have been authenticated by it and not by any other method? e.g. switchs are authenticating users locally and authorizing them against the tacacs server, how to prevent this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 02:42:49 GMT</pubDate>
    <dc:creator>DenyAnyAny</dc:creator>
    <dc:date>2019-03-11T02:42:49Z</dc:date>
    <item>
      <title>Tacacs+ Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/2039863#M184536</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;how to tell the Cisco Tacacs to only authorize users that have been authenticated by it and not by any other method? e.g. switchs are authenticating users locally and authorizing them against the tacacs server, how to prevent this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 02:42:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/2039863#M184536</guid>
      <dc:creator>DenyAnyAny</dc:creator>
      <dc:date>2019-03-11T02:42:49Z</dc:date>
    </item>
    <item>
      <title>Tacacs+ Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/2039864#M184540</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can specify this by adding:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authorization commands default group “ACS Server group name” local&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That tells it to authorize by querying a specified ACS server group first; if no reply then it will use the local database&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Oct 2012 20:15:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/2039864#M184540</guid>
      <dc:creator>jenny conlan</dc:creator>
      <dc:date>2012-10-23T20:15:59Z</dc:date>
    </item>
    <item>
      <title>Tacacs+ Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/2039865#M184551</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi there Maik,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This can be accomplish using "named list", for example let's say that your VTY users will use the ACS for authentication and authorization but the users who access the Console port should use authentication only against local switch database with no authorization, so we do the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;tacacs-server X.X.X.X key cisco123&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication login myacs group tacacs+&lt;/P&gt;&lt;P&gt;aaa authentication login mylocal local&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 mylocalautho group tacacs+&lt;/P&gt;&lt;P&gt;aaa authorization config-command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line console 0&lt;/P&gt;&lt;P&gt; login authentication mylocal&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line vty 0 14&lt;/P&gt;&lt;P&gt; login authentication myacs&lt;/P&gt;&lt;P&gt;&amp;nbsp; authorization command 15 mylocalautho &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can play with this and use different combinations for this feature depending on your requirements, let me know if you have any question about it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Oct 2012 22:21:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/2039865#M184551</guid>
      <dc:creator>mauzamor</dc:creator>
      <dc:date>2012-10-23T22:21:23Z</dc:date>
    </item>
    <item>
      <title>Tacacs+ Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/2039866#M184569</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi together,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so here my config:&lt;/P&gt;&lt;P&gt;aaa authentication login default group tacacs+ line&lt;/P&gt;&lt;P&gt;aaa authentication enable default group tacacs+ enable&lt;/P&gt;&lt;P&gt;aaa authorization console&lt;/P&gt;&lt;P&gt;aaa authorization exec default group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authorization commands 1 default local group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 default local group tacacs+ local&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have some local users with no password but with rsa-key:&lt;/P&gt;&lt;P&gt;username user1 privilege 15 nopassword&lt;/P&gt;&lt;P&gt;ip ssh pubkey-chain&lt;/P&gt;&lt;P&gt;&amp;nbsp; username user1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; key-hash ssh-rsa 9C4B0195499D69FED5B01C8DC70CED19&lt;/P&gt;&lt;P&gt;&amp;nbsp; quit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;user1 exists also on the ACS. When user1 tries to login, the switch authenticates it locally based on the ssh-rsa key, but authorizes it against the ACS. Strangely the ACS assumes that the user was authenticated by it. Is it possible to prevent this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Oct 2012 15:31:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/2039866#M184569</guid>
      <dc:creator>DenyAnyAny</dc:creator>
      <dc:date>2012-10-24T15:31:18Z</dc:date>
    </item>
    <item>
      <title>Tacacs+ Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/2039867#M184588</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;According with your configuration "aaa authentication login default group tacacs+ line" you are saying that all the authentication types (ssh, telnet, console) are going to use the TACACS+ server for authentication as the primary authentication method, if the TACACS+ server is down the next method is the line password, no local. I don't see any AAA command pointing the authentication to the Local switch database.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I don't think the switch is authenticating the user, seems like the authentication request is going to the ACS server, can you verify if after the user is authenticated you have a successful passed authentication in the ACS? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Oct 2012 15:45:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/2039867#M184588</guid>
      <dc:creator>mauzamor</dc:creator>
      <dc:date>2012-10-24T15:45:57Z</dc:date>
    </item>
    <item>
      <title>Tacacs+ Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/2039868#M184611</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't find any authentication entry but an authorization one!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Oct 2012 09:02:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authorization/m-p/2039868#M184611</guid>
      <dc:creator>DenyAnyAny</dc:creator>
      <dc:date>2012-10-25T09:02:13Z</dc:date>
    </item>
  </channel>
</rss>

