03-22-2022 04:34 PM
Hello All!
Hope you all are doing ok!
Does someone already had to change your tac_plus.conf file to insert the av pair in order to allow tacacs authentication in Cisco ACI ( APIC and switches[Spine/Leaf]) ?
I'am trying to edit inserting the av-pair as documented but not sure if should do it inside the brackets of 'service exec' session or create a new session.
I'am doing inside the group session for my network administrators.
I've tried this way below and didn't work:
group = networkadmins { default service = permit service = exec { priv-lvl = 15 optional brcd-role = "admin" } service = cisco-aci { cisco-av-pair = "shell:domains=all/custom-role-tacacs-admin/custom-role-tacacs-read-all|aaa" } service = junos-exec { local-user-name = netmanager } }
group = networkadmins { default service = permit service = exec { priv-lvl = 15 optional brcd-role = "admin" cisco-av-pair = "shell:domains=all/custom-role-tacacs-admin/custom-role-tacacs-read-all|aaa" } service = junos-exec { local-user-name = netmanager } }
Solved! Go to Solution.
10-03-2022 09:37 PM
Was looking for something else and came across your post, bit late but here's how I have it set up:
group = cisco-aci-admins {
default service = permit
service = shell {
set shell:domains = "all/admin/"
set priv-lvl = 15
}
}
group = cisco-aci-readonly {
default service = permit
service = shell {
set shell:domains = "all//read-all"
set priv-lvl = 15
}
}
10-03-2022 09:37 PM
Was looking for something else and came across your post, bit late but here's how I have it set up:
group = cisco-aci-admins {
default service = permit
service = shell {
set shell:domains = "all/admin/"
set priv-lvl = 15
}
}
group = cisco-aci-readonly {
default service = permit
service = shell {
set shell:domains = "all//read-all"
set priv-lvl = 15
}
}
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide