User authentication Authentication groups
IX10 User Guide
681
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Use the show command to display current configuration:
(config)> show auth method
0 local
1 radius
(config)>
4. Use the move command to rearrange the methods:
(config)> move auth method 1 0
(config)>
5. Use the show command again to verify the change:
(config)> show auth method
0 radius
1 local
(config)>
6. Save the configuration and apply the change:
(config)> save
Configuration saved.
>
7. Type exit to exit the Admin CLI.
Depending on your device configuration, you may be presented with an Access selection
menu. Type quit to disconnect from the device.
Authentication groups
Authentication groups are used to assign access rights to IX10 users. Three types of access rights can
be assigned:
n
Admin access: Users with Admin access can be configured to have either:
l
The ability to manage the IX10 device by using the WebUI or the Admin CLI.
l
Read-only access to the WebUI and Admin CLI.
n
Shell access: Users with Shell access have the ability to access the shell when logging into the
IX10 via ssh, telnet, or the serial console.
Shell access is not available if the Allow shell parameter has been disabled. See Disable shell
access for more information about the Allow shell parameter.
n
Serial access: Users with Serial access have the ability to log into the IX10 device by using the
serial console.
Preconfigured authentication groups
The IX10 device has two preconfigured authentication groups: