05-04-2023 09:43 AM
On cisco 93180 n9k - How can I configure aaa authentication using ISE TACACS while giving that user access to all exec commands on the device? My current configuration looks to TACACS for authorization of commands but I just want to configure the device to give any TACACS authenticated user full exec privileges.
current configuration:
aaa authentication login default group TACACS_LIST local
aaa authorization commands default group TACACS_LIST local
I tried setting the authorization command to default local but then it just takes away all permissions for anyone authenticated through TACACS.
05-04-2023 11:47 AM - edited 05-04-2023 11:50 AM
Hello @RyanPowers9691,
The "aaa authorization exec" command authorizes users for all EXEC sessions after they have been successfully authenticated through TACACS+. The "if-authenticated" keyword allows any user authenticated by TACACS+ to execute any EXEC command on the device.
Note that this configuration only provides authorization for EXEC sessions. If you also want to provide authorization for configuration changes, you should use the "aaa authorization config-commands" command instead of "aaa authorization exec".
05-08-2023 03:50 AM
none of the following commands are present on the nxos device:
aaa authorization exec
aaa authorization config-commands
if-authenticated
05-08-2023 04:53 AM - edited 05-08-2023 04:54 AM
I think M02@rt37 meaning here
for all exec command
aaa authorization commands {console | default } {group group-list [ local ] | local}
for config-t command
aaa authorization config-commands {console | default } {group group-list [ local ] | local}
sorry, there is no if-auth with authz in NX-OS
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide