02-02-2026 03:21 AM
Hi,
I try to create a full menu readonly user role for a 9800 WebUI. Privilege 1 shows only the Monitoring menu, but privilege 15 + command authorization (limited to "show *") does not work - the user is still able to do configuration changes. And I do not see any command authorization request in tacacs log.
Is there some kind of blueprint? I tries these commands.
aaa authentication login VTY_authen group dnac-network-tacacs-group local aaa authorization exec VTY_author group dnac-network-tacacs-group local if-authenticated aaa authorization commands 15 CMD_AUTH_LVL15 group dnac-network-tacacs-group local ! ip http authentication aaa login-authentication VTY_authen ip http authentication aaa exec-authorization VTY_author ip http authentication aaa command-authorization 15 CMD_AUTH_LVL15 ip http secure-server
02-02-2026 03:46 AM
- @Tobias Heisele You can't restrict to read-only with TACACS based authentication :
Ref https://community.cisco.com/t5/wireless/catalyst-9800-gui-tacacs-command-set/m-p/5012451/highlight/true#M266247
M.
02-02-2026 04:32 AM
Hi,
@Tobias Heisele What you're trying to achieve is not possible, having a read-only user account with complete access to GUI. See section Read-Only User Restrictions from following document:
There's also an bug / NFR / enhancement request for this functionality, not yet developed:
https://bst.cisco.com/bugsearch/bug/CSCwf12569?rfs=qvlogin
Thanks,
Cristian.
02-02-2026 05:10 AM
What TACACS are you using (ISE ?)
=====️ Preenayamo Vasudevam ️=====
***** Rate All Helpful Responses *****
02-02-2026 05:30 AM
Of cause. But Mark und Cristian took my last hope.
02-02-2026 12:04 PM
Did you mean you're using ISE for AAA?
=====️ Preenayamo Vasudevam ️=====
***** Rate All Helpful Responses *****
02-05-2026 07:31 AM
yes
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide