12: User Authentication
SLC™ 8000 Advanced Console Manager User Guide 253
3. To disable a method currently in the Enabled methods list, select the method and click the
right arrow between the lists.
4. To set the order in which the SLC unit will authenticate users, use the up and down
arrows to the left of the Enabled methods list.
5. For Attempt next method on authentication rejection, you have the following options:
- To enable the SLC 8000 advanced console manager to use all methods, in order of
precedence, until it obtains a successful authentication, select the check box. This is the
default.
- To enable the SLC unit to use only the first authentication method that responds (in case a
server is down or unavailable), clear the check box.
Note: When limiting accessibility of the sysadmin login to the physical SLC 8000
console manager device, make sure to uncheck Attempt next method on
authentication rejection.
6. Click Apply.
Now that you have enabled one or more authentication methods, you must configure them.
Authentication Commands
Go to Authentication Commands to view CLI commands which correspond to the web page
entries described above.
User Rights
The SLC has three user groups: Administrators, Power Users, and Default Users. Each has a
predefined set of rights; users inherit rights from the user group to which they belong. These rights
are in addition to the current functions that a user can perform at the command line interface:
connect direct/listen
set locallog/password/history/cli
show datetime/deviceport/locallog/portstatus/portcounters/
history/cli/user
The table below shows the mapping of groups and user rights.
TACACS+
(Terminal Access
Controller Access Control
System)
TACACS+ allows a remote access server to communicate with an
authentication server to determine whether the user has access to the network.
TACACS+ is a completely new protocol and is not compatible with TACACS or
XTACACS. The SLC 8000 advanced console manager supports TACACS+
only.
Local Users Local accounts on the SLC unit used to authenticate users who log in using
SSH, Telnet, the web, or the console port.