<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: aaa authentication for https access in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-for-https-access/m-p/357395#M429469</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Anyone?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 04 Apr 2005 20:38:39 GMT</pubDate>
    <dc:creator>triplecap</dc:creator>
    <dc:date>2005-04-04T20:38:39Z</dc:date>
    <item>
      <title>aaa authentication for https access</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-for-https-access/m-p/357394#M429459</link>
      <description>&lt;P&gt;I have several Catalyst 3750 switches that I'm running Tacacs on.  I set the switch up to be an http server so that some of our admins could administer the switches through the web gui.  Is it possible to login to the web console via your Tacacs login (in our case, our Windows username/password)?  I found the "ip http authentication aaa" command but this doesn't seem to do it.  I just don't want to share the local passwords if I don't have to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;Eric&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 21:04:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authentication-for-https-access/m-p/357394#M429459</guid>
      <dc:creator>triplecap</dc:creator>
      <dc:date>2019-03-10T21:04:32Z</dc:date>
    </item>
    <item>
      <title>Re: aaa authentication for https access</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-for-https-access/m-p/357395#M429469</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Anyone?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Apr 2005 20:38:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authentication-for-https-access/m-p/357395#M429469</guid>
      <dc:creator>triplecap</dc:creator>
      <dc:date>2005-04-04T20:38:39Z</dc:date>
    </item>
    <item>
      <title>Re: aaa authentication for https access</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-for-https-access/m-p/357396#M429480</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As far as I know, it is not possible to login to the web console via Tacacs login &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Apr 2005 20:54:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authentication-for-https-access/m-p/357396#M429480</guid>
      <dc:creator>umedryk</dc:creator>
      <dc:date>2005-04-04T20:54:08Z</dc:date>
    </item>
    <item>
      <title>Re: aaa authentication for https access</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-for-https-access/m-p/357397#M429485</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My experience of the web interface is that it uses the local password on the device and not the aaa authentication IDs and passwords.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Apr 2005 23:57:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authentication-for-https-access/m-p/357397#M429485</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2005-04-04T23:57:13Z</dc:date>
    </item>
  </channel>
</rss>

