05-18-2005 10:36 AM - edited 03-10-2019 02:09 PM
I'm trying to configure my devices to use shell command authorization sets located on my ACS box. I want users that are members of a specific group to only be allowed to certain commands (ex. show). I'm pretty sure my ACS box is setup correctly, but my devices aren't. Here is the current config:
aaa new-model
aaa authentication login default group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ local
aaa accounting exec default start-stop group tacacs+
I want the aaa authorization to use tacacs on my ACS box and whatever shell commands sets that are group specific when a user that is a member of that group logs in.
05-24-2005 11:43 AM
This URL explains the configuration required for Command authorization,
http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgcr/fsecur_c/fsecsp/scftplus.htm .
05-31-2005 12:56 PM
I am running ACS 3.3, and am trying to figure out how to get this to work too. I have a user group set up in the software and have defined a Shell Command Authorization Set with deny anything not listed, but the user still has access to more than the specified commands.
According to the software documentation, I shouldn't have to configure the groups in the configs for the devices...
Any tips on making this work?
06-01-2005 10:56 AM
From TAC:
This is what is needed for command authorization.
# exec authorization
aaa authorization exec default group tacacs+ none
# command authorization
aaa authorization commands 0 default group tacacs+ none
aaa authorization commands 1 default group tacacs+ none
aaa authorization commands 15 default group tacacs+ none
# authorization for config level commands
aaa authorization config-commands
06-01-2005 11:02 AM
From TAC:
This is what is needed for command authorization.
# exec authorization
aaa authorization exec default group tacacs+ none
# command authorization
aaa authorization commands 0 default group tacacs+ none
aaa authorization commands 1 default group tacacs+ none
aaa authorization commands 15 default group tacacs+ none
# authorization for config level commands
aaa authorization config-commands
06-01-2005 11:02 AM
From TAC:
This is what is needed for command authorization.
# exec authorization
aaa authorization exec default group tacacs+ none
# command authorization
aaa authorization commands 0 default group tacacs+ none
aaa authorization commands 1 default group tacacs+ none
aaa authorization commands 15 default group tacacs+ none
# authorization for config level commands
aaa authorization config-commands
06-01-2005 11:09 AM
1
10-14-2005 03:48 AM
your lucky I used this config and it still doesnt work.. I authenticate fine, but authorization does not work.. I used your command, after doing a ton of research and unsuccessful trials... Anyway having none at the end made sense until I tried it and it did not work =/ Maybe its my server settings I dont know. IConfigured a group with one user, and I set everything on the user to group control, then I configured the group to exec and wrote in priv level '1'
How did you get it??
10-14-2005 08:37 AM
Marek
I believe that the commands listed by Heather are correct. If you have not gotten authorization to work successfully perhaps you can post all of the aaa section of your config. If we can see it we may be able to make suggestions.
HTH
Rick
10-24-2005 05:06 AM
aaa new-model
!
!
aaa authentication login default group tacacs+ enable
aaa authentication login level1 group tacacs+
aaa authorization exec default group tacacs+
aaa authorization commands 0 default group tacacs+
aaa authorization commands 0 level1 group tacacs+
aaa authorization commands 1 default group tacacs+
aaa authorization commands 1 level1 group tacacs+
aaa authorization commands 15 default group tacacs+
aaa authorization configuration default group tacacs+
aaa session-id common
ip subnet-zero
!
output cut
!
!
tacacs-server host 192.168.1.2
tacacs-server directed-request
tacacs-server key cisco
radius-server authorization permit missing Service-Type
call rsvp-sync
!
!
I have tried the exact config he posted but then I switched back. what do you think, Could it be that the acs server is where the wrong confoiguration is?
thank you
10-24-2005 12:50 PM
Marek
While I do have some suggestions to make about your config I do not see anything that should prevent authorization from working. Perhaps you can be a bit more specific about how you have configured the server to support this.
I see that you have aaa authentication for login but not for enable. I would suggest that you also configure:
aaa authentication enable default group tacacs+ enable
I see that your authentication and authorization refer to level1 but I do not see where you apply level1 to any lines or anything. Perhaps you could clarify whether it is actually defined somewhere and if so where and how.
I see that except for your first aaa authentication login default which has a backup method that all of the other authentication and authorization have only primary method with no backup. I would suggest including a backup method to cover situations where the server is not available. I believe that none is a workable backup, but I prefer if-authenticated as the backup for authorization.
Can you verify that authentication is working ok and the only issue is with authorization. If authentication is working then we know that the parts of the config that identify the server are correct.
HTH
Rick
10-24-2005 10:31 PM
1. Authentication is working ok, with failover to the enable pasword in case the server is offline.
2. level1 is a group I have created on the server, maybe I'm not supposed to specify on the client device but I was running out of ideas, and I'm having a hard time finding anything on autorization with the secure acs along with configs for both. I have gone through pages on this forum and I cant find specifically what I need. Obviously if I was more knoledgable I wouldnt have to bother you guys.
3. Unless I erased it, I'm pretty sure authentication has a backup enable password authentication. Authorization used to have the secondary set to none like in his config but I changed it back because it did not work either.
4. The server has two groups configured, each one has one user. Each user, one for each groupd, authenticates. But when I log in they privelage level is always 15, and I can run any commands. I have also configured an exec set of commands which I have limited to show and applied it within the group. I can take screen shots of the server config, if you specify which areas you need.
I really appreciate you taking the time to help me out.
10-25-2005 01:37 AM
Marek
1) it is good to know that authentication is working and does fail over to the enable password. This helps assure that the problem that we are dealing with is not an issue of failure to communicate.
2) it is not necessary that the router mirror the groups that are configured on the server. So unless you want to specify authentication or authorization processing different from default then you do not need level1 to be mentioned on the router.
I agree that there is not a lot of clear documentation about authorization. One of the purposes of this forum is to allow people to ask questions about things that they do not yet understand and hopefully to get some helpful answers. As you get more experience and understand more then you may be able to participate in the forum and providing answers in addition to asking questions.
3) As I read your config authentication does have a backup method and authorization does not. I am a proponent of having backup methods configured. As long as the server is available you do not need them. But if they are not configured and the server is not available you can manage to lock yourself out of the router.
I can understand removing them while you concentrate on why the authorization is not working (though I would not do it that way) but I strongly suggest that you plan to put the backups in before you put anything like this into production.
4) the fact that both users log in and are already at privilege level 15 may be a clue. Look in the config under the console and under the vty ports. Look for this configuration command privilege level 15. If it is there remove it and test over again.
HTH
Rick
10-25-2005 03:43 AM
I have checked and I do not see anything.
I think I should be able to use radius for authorization while keeping tacacs+ for authentication.
Would that be easier to do? thanks again
10-25-2005 05:22 AM
Marek
I do not think that it would be easier that way. Radius does not have a separate step for authorization the way that TACACS does. I think that you should keep the same protocol for both authentication and authorization.
It might help if you would post a current copy of the config of the router that you are working with.
HTH
Rick
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide