Administrator Guide

In the following example the command protocol permissions are reset to their original setting or one or more of the system-dened roles
and any roles that inherited permissions from them.
Dell(conf)#role configure reset protocol
Adding and Deleting Users from a Role
To create a user name that is authenticated based on a user role, use the username name password encryption-type password role
role-name command in CONFIGURATION mode.
Example
The following example creates a user name that is authenticated based on a user role.
Dell (conf) #username john password 0 password role secadmin
The following example deletes a user role.
NOTE: If you already have a user ID that exists with a privilege level, you can add the user role to username that has a privilege
Dell (conf) #no username john
The following example adds a user, to the secadmin user role.
Dell (conf)#username john role secadmin password 0 password
AAA Authentication and Authorization for Roles
This section describes how to congure AAA Authentication and Authorization for Roles.
Conguration Task List for AAA Authentication and Authorization for Roles
This section contains the following AAA Authentication and Authorization for Roles conguration tasks:
Conguring AAA Authentication for Roles
Conguring AAA Authorization for Roles
Conguring TACACS+ and RADIUS VSA Attributes for RBAC
Congure AAA Authentication for Roles
Authentication services verify the user ID and password combination. Users with dened roles and users with privileges are authenticated
with the same mechanism. There are six methods available for authentication: radius, tacacs+, local, enable, line, and none.
When role-based only AAA authorization is enabled, the enable, line, and none methods are not available. Each of these three methods
allows users to be veried with either a password that is not specic to their user ID or with no password at all. Because of the lack of
security these methods are not available for role only mode. When the system is in role-only mode, users that have only privilege levels are
denied access to the system because they do not have a role. For information about role only mode, see Conguring Role-based Only AAA
Authorization.
NOTE
: Authentication services only validate the user ID and password combination. To determine which commands are permitted
for users, congure authorization. For information about how to congure authorization for roles, see Congure AAA
Authorization for Roles.
To congure AAA authentication, use the aaa authentication command in CONFIGURATION mode.
aaa authentication login {method-list-name | default} method [… method4]
Security
827