<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Microsoft NPS Radius for Switch Authenticate and Authorization in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/microsoft-nps-radius-for-switch-authenticate-and-authorization/m-p/5356566#M1123907</link>
    <description>&lt;P&gt;Sorry, IOS version is:&amp;nbsp;c1000-universalk9-mz.152-7.E6&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 19 Dec 2025 19:18:28 GMT</pubDate>
    <dc:creator>BrianChernish</dc:creator>
    <dc:date>2025-12-19T19:18:28Z</dc:date>
    <item>
      <title>Microsoft NPS Radius for Switch Authenticate and Authorization</title>
      <link>https://community.cisco.com/t5/network-security/microsoft-nps-radius-for-switch-authenticate-and-authorization/m-p/5356530#M1123900</link>
      <description>&lt;P&gt;Is the following even possible?&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would like to configure Microsoft NPS to act as a Radius Server to authenticate and allow users who are present in one of two active directory OU's (OU #1 &amp;amp; OU I#2) to ssh into the device and then if the user is in OU #1, allow privilege level 15 access. If the user in OU #2, allow read only access (including the ability to use the "show run" command).&amp;nbsp;&lt;/P&gt;&lt;P&gt;It seems like I can control this by adding 2 network access policies (one for Priv 15 and one for Priv 7) but that where I get stuck&lt;/P&gt;&lt;P&gt;I got it to work and allow a member of OU#1 to log in and have privilege level 15 access BUT only after I added a local user with the same login name to the configuration. Ideally I would like to configure a single local account that could be used if Radius was not available.&lt;/P&gt;&lt;P&gt;Any guidance is appreciated!&lt;/P&gt;</description>
      <pubDate>Fri, 19 Dec 2025 16:33:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/microsoft-nps-radius-for-switch-authenticate-and-authorization/m-p/5356530#M1123900</guid>
      <dc:creator>BrianChernish</dc:creator>
      <dc:date>2025-12-19T16:33:18Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft NPS Radius for Switch Authenticate and Authorization</title>
      <link>https://community.cisco.com/t5/network-security/microsoft-nps-radius-for-switch-authenticate-and-authorization/m-p/5356557#M1123905</link>
      <description>&lt;P&gt;Hi Brian. Which Cisco product and version are you working with for this configuraiton?&lt;/P&gt;
&lt;DIV id="bodyDisplay_3" class="lia-message-body lia-component-message-view-widget-body lia-component-body-signature-highlight-escalation lia-component-message-view-widget-body-signature-highlight-escalation"&gt;
&lt;DIV class="lia-message-body-content"&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Fri, 19 Dec 2025 18:57:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/microsoft-nps-radius-for-switch-authenticate-and-authorization/m-p/5356557#M1123905</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2025-12-19T18:57:29Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft NPS Radius for Switch Authenticate and Authorization</title>
      <link>https://community.cisco.com/t5/network-security/microsoft-nps-radius-for-switch-authenticate-and-authorization/m-p/5356565#M1123906</link>
      <description>&lt;P&gt;We are accessing Cisco C9200, C9300 and C1000 switches.&amp;nbsp; Our Domain Controller server is Windows Server 2019.&lt;/P&gt;&lt;P&gt;I have this working (mostly) with the exception that read only users cannot do a "Show Run".&amp;nbsp; Here is my (sanitized) config :&lt;/P&gt;&lt;P&gt;B007-SW21#sh run&lt;BR /&gt;Building configuration...&lt;/P&gt;&lt;P&gt;Current configuration : 6493 bytes&lt;BR /&gt;!&lt;BR /&gt;! Last configuration change at 05:51:31 MST Thu Dec 18 2025 by bchernish&lt;BR /&gt;! NVRAM config last updated at 05:51:35 MST Thu Dec 18 2025 by bchernish&lt;BR /&gt;!&lt;BR /&gt;version 15.2&lt;BR /&gt;no service pad&lt;BR /&gt;service timestamps debug datetime msec localtime&lt;BR /&gt;service timestamps log datetime msec localtime&lt;BR /&gt;service password-encryption&lt;BR /&gt;!&lt;BR /&gt;hostname B007-SW21&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;logging buffered 16384&lt;BR /&gt;logging persistent&lt;BR /&gt;enable secret 9 $9$31ZkRjyjqQLZ.b$oye6J/DhjIYNv3JDku/50pahip6PaqTLDclfJ2f4eCU&lt;BR /&gt;enable password 7 00071F0717485F0301204E420C&lt;BR /&gt;!&lt;BR /&gt;username bchernish privilege 15 secret 9 $9$zqN3lE5MwYzYE.$BDxxcR7i.xrUSp35Up5o7zBc1vltEyRKiibLhYAqt06&lt;BR /&gt;username cgundy privilege 15 secret 9 $9$D22pwqE2VtCIPE$h1VisznxHqw5tFWMjl4bXqXVq6tPva8kd4jzUtYjYGY&lt;BR /&gt;username ninja privilege 15 secret 9 $9$fxjEjwSU6NIyzj$TwVk0wVPL.wu/pv0EuJocRCiKXF.1mUSQyZDlrnf/3A&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa group server radius aas-radius&lt;BR /&gt;server name svdc2&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login default group aas-radius local&lt;BR /&gt;aaa authorization config-commands&lt;BR /&gt;aaa authorization exec default group aas-radius local&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;BR /&gt;clock timezone MST -7 0&lt;BR /&gt;switch 1 provision c1000-16fp-2g-l&lt;BR /&gt;system mtu routing 1500&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip domain-name class4mro&lt;BR /&gt;vtp domain ascentmro&lt;BR /&gt;vtp mode transparent&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;mls qos srr-queue output cos-map queue 1 threshold 1 4&lt;BR /&gt;mls qos srr-queue output cos-map queue 2 threshold 1 2 6 7&lt;BR /&gt;mls qos srr-queue output cos-map queue 2 threshold 2 3&lt;BR /&gt;mls qos srr-queue output cos-map queue 3 threshold 2 0&lt;BR /&gt;mls qos srr-queue output cos-map queue 4 threshold 2 1&lt;BR /&gt;mls qos srr-queue output dscp-map queue 1 threshold 2 32 33 40 41 42 43 44 45&lt;BR /&gt;mls qos srr-queue output dscp-map queue 1 threshold 2 46 47&lt;BR /&gt;mls qos srr-queue output dscp-map queue 2 threshold 1 16 17 18 19 20 21 22 23&lt;BR /&gt;mls qos srr-queue output dscp-map queue 2 threshold 1 26 27 28 29 30 31 34 35&lt;BR /&gt;mls qos srr-queue output dscp-map queue 2 threshold 1 36 37 38 39&lt;BR /&gt;mls qos srr-queue output dscp-map queue 2 threshold 2 24 48 49 50 51 52 53 54&lt;BR /&gt;mls qos srr-queue output dscp-map queue 2 threshold 2 55 56 57 58 59 60 61 62&lt;BR /&gt;mls qos srr-queue output dscp-map queue 2 threshold 2 63&lt;BR /&gt;mls qos srr-queue output dscp-map queue 3 threshold 1 0 1 2 3 4 5 6 7&lt;BR /&gt;mls qos srr-queue output dscp-map queue 4 threshold 1 8 9 10 11 12 13 14 15&lt;BR /&gt;mls qos&lt;BR /&gt;!&lt;BR /&gt;crypto pki trustpoint TP-self-signed-3727410048&lt;BR /&gt;enrollment selfsigned&lt;BR /&gt;subject-name cn=IOS-Self-Signed-Certificate-3727410048&lt;BR /&gt;revocation-check none&lt;BR /&gt;rsakeypair TP-self-signed-3727410048&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto pki certificate chain TP-self-signed-3727410048&lt;BR /&gt;archive&lt;BR /&gt;log config&lt;BR /&gt;logging enable&lt;BR /&gt;logging size 500&lt;BR /&gt;hidekeys&lt;BR /&gt;!&lt;BR /&gt;spanning-tree mode rapid-pvst&lt;BR /&gt;spanning-tree extend system-id&lt;BR /&gt;auto qos srnd4&lt;BR /&gt;!&lt;BR /&gt;vlan internal allocation policy ascending&lt;BR /&gt;!&lt;BR /&gt;vlan 2&lt;BR /&gt;name Legacy2_Data&lt;BR /&gt;!&lt;BR /&gt;vlan 4&lt;BR /&gt;name Legacy4_Data&lt;BR /&gt;!&lt;BR /&gt;vlan 111&lt;BR /&gt;name 111_Data&lt;BR /&gt;!&lt;BR /&gt;vlan 114&lt;BR /&gt;name 114_Data&lt;BR /&gt;!&lt;BR /&gt;vlan 115&lt;BR /&gt;name 115_Data&lt;BR /&gt;!&lt;BR /&gt;vlan 116&lt;BR /&gt;name mzjbiz_wireless&lt;BR /&gt;!&lt;BR /&gt;vlan 123&lt;BR /&gt;name ManagementNetwork&lt;BR /&gt;!&lt;BR /&gt;vlan 124&lt;BR /&gt;name rfid&lt;BR /&gt;!&lt;BR /&gt;vlan 211&lt;BR /&gt;name 211_Voice&lt;BR /&gt;!&lt;BR /&gt;vlan 214&lt;BR /&gt;name 214_Voice&lt;BR /&gt;!&lt;BR /&gt;vlan 215&lt;BR /&gt;name 215_Voice&lt;BR /&gt;!&lt;BR /&gt;vlan 999&lt;BR /&gt;name black_hole&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;class-map match-all AUTOQOS_VOIP_VIDEO_CLASS&lt;BR /&gt;match ip dscp af41&lt;BR /&gt;class-map match-all AUTOQOS_VOIP_DATA_CLASS&lt;BR /&gt;match ip dscp ef&lt;BR /&gt;class-map match-all AUTOQOS_DEFAULT_CLASS&lt;BR /&gt;match access-group name AUTOQOS-ACL-DEFAULT&lt;BR /&gt;class-map match-all AUTOQOS_VOIP_SIGNAL_CLASS&lt;BR /&gt;match ip dscp cs3&lt;BR /&gt;!&lt;BR /&gt;policy-map AUTOQOS-SRND4-CISCOPHONE-POLICY&lt;BR /&gt;class AUTOQOS_VOIP_DATA_CLASS&lt;BR /&gt;set dscp ef&lt;BR /&gt;class AUTOQOS_VOIP_VIDEO_CLASS&lt;BR /&gt;set dscp af41&lt;BR /&gt;class AUTOQOS_VOIP_SIGNAL_CLASS&lt;BR /&gt;set dscp cs3&lt;BR /&gt;class AUTOQOS_DEFAULT_CLASS&lt;BR /&gt;set dscp default&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/1&lt;BR /&gt;description Not In Use&lt;BR /&gt;switchport mode trunk&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/2&lt;BR /&gt;switchport access vlan 999&lt;BR /&gt;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/3&lt;BR /&gt;switchport access vlan 999&lt;BR /&gt;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/4&lt;BR /&gt;switchport access vlan 999&lt;BR /&gt;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/5&lt;BR /&gt;switchport access vlan 999&lt;BR /&gt;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/6&lt;BR /&gt;switchport access vlan 999&lt;BR /&gt;switchport mode access&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/7&lt;BR /&gt;description PHONE-PC PORT&lt;BR /&gt;switchport mode access&lt;BR /&gt;switchport voice vlan 1&lt;BR /&gt;spanning-tree portfast edge&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/8&lt;BR /&gt;switchport access vlan 999&lt;BR /&gt;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/9&lt;BR /&gt;description Composites Ricoh IM4000&lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;switchport mode access&lt;BR /&gt;spanning-tree portfast edge&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/10&lt;BR /&gt;switchport access vlan 999&lt;BR /&gt;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/11&lt;BR /&gt;switchport access vlan 999&lt;BR /&gt;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/12&lt;BR /&gt;switchport access vlan 999&lt;BR /&gt;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/13&lt;BR /&gt;switchport access vlan 999&lt;BR /&gt;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/14&lt;BR /&gt;description TECHLIB&lt;BR /&gt;switchport access vlan 111&lt;BR /&gt;switchport mode access&lt;BR /&gt;switchport voice vlan 211&lt;BR /&gt;spanning-tree portfast edge&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/15&lt;BR /&gt;description hangar cam 2&lt;BR /&gt;switchport mode access&lt;BR /&gt;spanning-tree portfast edge&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/16&lt;BR /&gt;description TIME CLOCK&lt;BR /&gt;switchport mode access&lt;BR /&gt;spanning-tree portfast edge&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/17&lt;BR /&gt;description UPLINK TO B011 (copper)&lt;BR /&gt;switchport trunk allowed vlan 1,2,4,111,114-116,123,124,153,211,214,215&lt;BR /&gt;switchport mode trunk&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/18&lt;BR /&gt;description UPLINK TO Core&lt;BR /&gt;switchport trunk allowed vlan 1,2,4,111,114-116,123,124,153,211,214,215&lt;BR /&gt;switchport mode trunk&lt;BR /&gt;ip access-group 107 in&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Vlan123&lt;BR /&gt;ip address 172.17.123.7 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan211&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;ip default-gateway 172.17.1.1&lt;BR /&gt;no ip http server&lt;BR /&gt;ip http banner&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;ip ssh version 2&lt;BR /&gt;ip ssh server algorithm mac hmac-sha2-256 hmac-sha2-512&lt;BR /&gt;ip ssh server algorithm kex diffie-hellman-group14-sha1&lt;BR /&gt;!&lt;BR /&gt;access-list 107 deny icmp any any timestamp-request&lt;BR /&gt;access-list 107 deny icmp any any timestamp-reply&lt;BR /&gt;access-list 107 permit ip any any&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;snmp-server community ascent RW&lt;BR /&gt;snmp-server community cla554ro RO&lt;BR /&gt;snmp-server community cla554rw RW&lt;BR /&gt;snmp mib flash cache&lt;BR /&gt;!&lt;BR /&gt;radius-server attribute 6 on-for-login-auth&lt;BR /&gt;!&lt;BR /&gt;radius server svdc2&lt;BR /&gt;address ipv4 172.17.0.169 auth-port 1812 acct-port 1813&lt;BR /&gt;key 7 063207285F671A361005210E0F162F3F75&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;exec-timeout 60 0&lt;BR /&gt;stopbits 1&lt;BR /&gt;line vty 0 4&lt;BR /&gt;exec-timeout 60 0&lt;BR /&gt;transport input ssh&lt;BR /&gt;line vty 5 15&lt;BR /&gt;exec-timeout 60 0&lt;BR /&gt;transport input ssh&lt;BR /&gt;!&lt;BR /&gt;ntp server 172.17.1.1&lt;BR /&gt;end&lt;/P&gt;</description>
      <pubDate>Fri, 19 Dec 2025 19:16:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/microsoft-nps-radius-for-switch-authenticate-and-authorization/m-p/5356565#M1123906</guid>
      <dc:creator>BrianChernish</dc:creator>
      <dc:date>2025-12-19T19:16:56Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft NPS Radius for Switch Authenticate and Authorization</title>
      <link>https://community.cisco.com/t5/network-security/microsoft-nps-radius-for-switch-authenticate-and-authorization/m-p/5356566#M1123907</link>
      <description>&lt;P&gt;Sorry, IOS version is:&amp;nbsp;c1000-universalk9-mz.152-7.E6&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Dec 2025 19:18:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/microsoft-nps-radius-for-switch-authenticate-and-authorization/m-p/5356566#M1123907</guid>
      <dc:creator>BrianChernish</dc:creator>
      <dc:date>2025-12-19T19:18:28Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft NPS Radius for Switch Authenticate and Authorization</title>
      <link>https://community.cisco.com/t5/network-security/microsoft-nps-radius-for-switch-authenticate-and-authorization/m-p/5356786#M1123912</link>
      <description>&lt;P&gt;Based on the information you shared, my understanding is that you are assigning privilege-level 7 for the read-only users, correct? If yes, there are additional configurations required:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;By default any privilege levels outside of 0,1 &amp;amp; 15 are "blank / empty." As a result, you will need to manually assign commands to privilege level 7&lt;/LI&gt;
&lt;LI&gt;"show run" is a bit tricker as you can make the command available to different privilege levels but it will only output configs for which the current privilege is empowered for. Thus, by default, if show run is the only command assigned to privilege level 7, the output of it will be blank.&amp;nbsp;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;TACACS+ makes all of this a lot easier since you can simply give the "read-only" user privilege level 15 while prohibiting all commands except "show run" However, since you are using RADIUS, you will need the following:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;privilege exec level 7 show running-config view full&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;privilege exec level 7 show running-config view&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;privilege exec level 7 show running-config&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;privilege exec level 7 show&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;file privilege 7&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The read-only user with privilege-level 7 will need to execute the following command to get the full output of the running-config:&amp;nbsp;&lt;STRONG&gt;show running-config view full&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV id="bodyDisplay_3" class="lia-message-body lia-component-message-view-widget-body lia-component-body-signature-highlight-escalation lia-component-message-view-widget-body-signature-highlight-escalation"&gt;
&lt;DIV class="lia-message-body-content"&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Mon, 22 Dec 2025 00:54:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/microsoft-nps-radius-for-switch-authenticate-and-authorization/m-p/5356786#M1123912</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2025-12-22T00:54:43Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft NPS Radius for Switch Authenticate and Authorization</title>
      <link>https://community.cisco.com/t5/network-security/microsoft-nps-radius-for-switch-authenticate-and-authorization/m-p/5357979#M1123939</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;First, I would recommend the following changes on your RADIUS and AAA configs (statically define the source interface for RADIUS generated packets to avoid this changing due to potential routing changes; per your current scope you don't need authorization for config-commands enabled, you might need in future, so you can leave this command on or remove it, doesn't matter at this point; I'm assuming you want the same behaviour to apply for console access as it does for VTY / SSH access, for which reason you need "aaa authorization console" enabled; since you don't have TACACS to account for which user performed which commands, "aaa accounting command local" is a way to log these activities in the local buffer, visible via "show logging"; the previous mentioned option for command accounting can work in parallel or be replaced by the archive logging feature, in which case you can see which user performed which CLI commands via "show archive log config all"):&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;aaa group server radius aas-radius
ip radius source-interface Vlanx
!
no aaa authorization config-commands
aaa authorization console
aaa accounting commands local
!
archive
 log config
  logging enable
  logging size 1000
&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;Next, when RADIUS server is configured correctly, to assign privilege-level as well, you don't need the same username to also exist in the switch configuration, follow this guide to ensure you have NPS well configured:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.mcgearytech.com/how-to-integrating-cisco-devices-cli-access-with-microsoft-npsradius/" target="_blank"&gt;https://www.mcgearytech.com/how-to-integrating-cisco-devices-cli-access-with-microsoft-npsradius/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Third, for your remote users getting privilege level 15, there's nothing else to be done, for users getting privilege level 7 with the rights you've mentioned, the following configuration is required (these users will be able to view complete running-configuration only by using command "show running-config view full":&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;privilege exec level 7 show running-config view full
file privilege 7&lt;/LI-CODE&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Cristian.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Dec 2025 15:40:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/microsoft-nps-radius-for-switch-authenticate-and-authorization/m-p/5357979#M1123939</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2025-12-28T15:40:38Z</dc:date>
    </item>
  </channel>
</rss>

