<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Command authorization failed in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/command-authorization-failed/m-p/2253765#M357428</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Yong,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Agree with Jatin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The thing with the ASA is that when performing authorization it will do a preservation of the username, in this case it will preserve the username in privilege mode ( as you are not authenticating the enable password&amp;nbsp; it will use the default privilige_15 username )&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Authenticate the enable password against the ACS and you should be good to go,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let us know the result,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 27 May 2013 16:58:08 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2013-05-27T16:58:08Z</dc:date>
    <item>
      <title>Command authorization failed</title>
      <link>https://community.cisco.com/t5/network-security/command-authorization-failed/m-p/2253761#M357424</link>
      <description>&lt;P&gt;Hi all, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is the problem statement:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For device admin purpose, when enable AAA access/Authorization in ASDM, it not allow user to configure the ASA via CLI. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when trying to configure, It will promopt message of "command authorization failed"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the topology setup:&lt;/P&gt;&lt;P&gt;01.ASA code running in version 8.4.2&lt;/P&gt;&lt;P&gt;02. Cisco ACS running in version 5.3.0.40&lt;/P&gt;&lt;P&gt;For device admin purpose, using Cisco ACS 5.3 as the backend AAA server, running on protocol TACACS+ &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There's no issue on AAA setting of authenticaiton and authorization part. Shell profile's privilege level and command set's command were running well in Cisco ios router/switch device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For ASA ASDM access, it able to support users' Shell profile's privilege level assigned at Cisco ACS server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Specific user privilege on ASA were using "configure command privleges", it's using default setting, apply to all. View-only on privilege 3, admin level on 15. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Problem only after enable ASDM AAA access/ authorization, it not allow to configure the ASA via CLI&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;attach the snipet of ASA firewall config and the debug log, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope you guys able to pin point my mistake. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Million Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Noel&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:49:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/command-authorization-failed/m-p/2253761#M357424</guid>
      <dc:creator>yong khang NG</dc:creator>
      <dc:date>2019-03-12T01:49:33Z</dc:date>
    </item>
    <item>
      <title>Command authorization failed</title>
      <link>https://community.cisco.com/t5/network-security/command-authorization-failed/m-p/2253762#M357425</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Yong,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way you can share a snapshot of the error u are getting on the ACS (The log on the TACACS+ authorization AAA monitoring area)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That would lead us to a solution as right now seems to be a missconfiguration with the command set configured as result for that specific user,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 May 2013 06:48:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/command-authorization-failed/m-p/2253762#M357425</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-05-27T06:48:58Z</dc:date>
    </item>
    <item>
      <title>Re: Command authorization failed</title>
      <link>https://community.cisco.com/t5/network-security/command-authorization-failed/m-p/2253763#M357426</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi jc&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for the reply. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i attached some snapshot on the ACS configuration. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Quesiton 1: it show username as enable_15. while i am using username:admin to perform authentication which i created at ACS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Noel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 May 2013 07:51:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/command-authorization-failed/m-p/2253763#M357426</guid>
      <dc:creator>yong khang NG</dc:creator>
      <dc:date>2013-05-27T07:51:41Z</dc:date>
    </item>
    <item>
      <title>Re: Command authorization failed</title>
      <link>https://community.cisco.com/t5/network-security/command-authorization-failed/m-p/2253764#M357427</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Yong,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since you are doing command authorization against ACS/TACACS and then local. &lt;/P&gt;&lt;P&gt;aaa authorization command ACS LOCAL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so If we are configuring command authorization on ASA, we have to make sure that we have enable authenticaiton&amp;nbsp; configured from the same tacacs server. otherwise we would see failed logs for&amp;nbsp; "enable_15".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please add the below listed command on the ASA and make sure we define and use the enable password from ACS.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;aaa authentication enable console ACS LOCAL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know how it goes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jatin Katyal &lt;BR /&gt; - Do rate helpful posts -&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 May 2013 12:33:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/command-authorization-failed/m-p/2253764#M357427</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-05-27T12:33:25Z</dc:date>
    </item>
    <item>
      <title>Re: Command authorization failed</title>
      <link>https://community.cisco.com/t5/network-security/command-authorization-failed/m-p/2253765#M357428</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Yong,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Agree with Jatin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The thing with the ASA is that when performing authorization it will do a preservation of the username, in this case it will preserve the username in privilege mode ( as you are not authenticating the enable password&amp;nbsp; it will use the default privilige_15 username )&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Authenticate the enable password against the ACS and you should be good to go,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let us know the result,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 May 2013 16:58:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/command-authorization-failed/m-p/2253765#M357428</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-05-27T16:58:08Z</dc:date>
    </item>
    <item>
      <title>Re: Command authorization failed</title>
      <link>https://community.cisco.com/t5/network-security/command-authorization-failed/m-p/2253766#M357429</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi both&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for the idea and it do work on this case. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but i hit another problem !&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My test case only telling username: admin with privilege level 15; whilst i have another user with lower privilege, username:ops with privilege level 3, role is monitoring, and read-only on configuration (CLI)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In CLI, it can pass thru the authentication process, but not able to let username:ops get into exec mode. It stuck in enable password.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even i create the enable password with privilege level 3, but it also not let go. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anything i can tune?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 May 2013 07:42:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/command-authorization-failed/m-p/2253766#M357429</guid>
      <dc:creator>yong khang NG</dc:creator>
      <dc:date>2013-05-28T07:42:20Z</dc:date>
    </item>
    <item>
      <title>Re: Command authorization failed</title>
      <link>https://community.cisco.com/t5/network-security/command-authorization-failed/m-p/2253767#M357430</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Since TACACS is your primary authentication method so it doesn't matter what role you have on the local database. I would like to see what enable privileges you have assisgned user:ops on the ACS. Can you get the screen shot from the policy elements.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, take a look at the tacacs authentication section in the logging and monitoring section to see what error you are getting.As far as I guess, it should be related to enable privileges.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jatin Katyal &lt;BR /&gt;- Do rate helpful posts -&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 May 2013 07:50:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/command-authorization-failed/m-p/2253767#M357430</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-05-28T07:50:46Z</dc:date>
    </item>
    <item>
      <title>Re: Command authorization failed</title>
      <link>https://community.cisco.com/t5/network-security/command-authorization-failed/m-p/2253768#M357431</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jatin, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;yeah i do think there's something missing. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i attached the ASA config snipet and the ACS config snapshot for your to view. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Noel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 May 2013 09:03:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/command-authorization-failed/m-p/2253768#M357431</guid>
      <dc:creator>yong khang NG</dc:creator>
      <dc:date>2013-05-28T09:03:38Z</dc:date>
    </item>
    <item>
      <title>Re: Command authorization failed</title>
      <link>https://community.cisco.com/t5/network-security/command-authorization-failed/m-p/2253769#M357432</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;set the maximum privilege to 15 in policy elements. Even after doing that, you will still be able to access only show commands. This is a required settings for enable authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jatin Katyal &lt;BR /&gt;- Do rate helpful posts -&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 May 2013 12:31:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/command-authorization-failed/m-p/2253769#M357432</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2013-05-28T12:31:01Z</dc:date>
    </item>
    <item>
      <title>Re: Command authorization failed</title>
      <link>https://community.cisco.com/t5/network-security/command-authorization-failed/m-p/2253770#M357433</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jatin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It work as expected, thanks for these days support&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Noel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 May 2013 05:04:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/command-authorization-failed/m-p/2253770#M357433</guid>
      <dc:creator>yong khang NG</dc:creator>
      <dc:date>2013-05-29T05:04:33Z</dc:date>
    </item>
    <item>
      <title>I got the same issue with</title>
      <link>https://community.cisco.com/t5/network-security/command-authorization-failed/m-p/2253771#M357434</link>
      <description>&lt;P&gt;I got the same issue with admin context, when I hit a command, an error message : command authorization failed.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;An account : enable_15 who is authneticated not my normal account.&lt;/P&gt;
&lt;P&gt;The solution was to create a new account in ACS with enable_15 as credential.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Nov 2015 02:53:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/command-authorization-failed/m-p/2253771#M357434</guid>
      <dc:creator>benissetaib</dc:creator>
      <dc:date>2015-11-26T02:53:51Z</dc:date>
    </item>
    <item>
      <title>Re: Command authorization failed</title>
      <link>https://community.cisco.com/t5/network-security/command-authorization-failed/m-p/3196107#M357435</link>
      <description>&lt;P&gt;.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2017 18:11:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/command-authorization-failed/m-p/3196107#M357435</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2017-10-09T18:11:43Z</dc:date>
    </item>
  </channel>
</rss>

