Users Guide

Table Of Contents
Configure the AAA authentication method in CONFIGURATION mode.
aaa authentication login {console | default} {local | group radius | group tacacs+}
consoleConfigure authentication methods for console logins.
defaultConfigure authentication methods for nonconsole such as SSH and Telnet logins.
localUse the local username, password, and role entries configured with the username password role
command.
group radiusConfigure RADIUS servers using the radius-server host command.
group tacacs+Configure TACACS+ servers using the tacacs-server host command.
Configure user role on server
If a console user logs in with RADIUS or TACACS+ authentication, the role you configured for the user on the RADIUS or
TACACS+ server applies. User authentication fails if no role is configured on the authentication server.
To authenticate a user on OS10 through a TACACS+ server, configure the mandatory role with the value sysadmin along with
15 as privilege level on the TACACS+ Server. The following figure shows the Cisco ISE TACACS server configuration:
Also, you must configure the user role on the RADIUS or TACACS+ server using the vendor-specific attribute (VSA) or the
authentication fails. The vendor ID of Dell EMC is 674. Create a VSA with Name = Dell-group-name, OID = 2,
Security
1121