Reference Guide

Table Of Contents
key 9 authentication-key Enter an authentication key in encrypted format (up to 128
characters).
authentication-key Enter an authentication in plain text (up to 42 characters). It is not
necessary to enter 0 before the key.
key authentication-key Enter a text string for the encryption key used to authenticate the
switch on the TACACS+ server (up to 42 characters).
Default Not configured
Command Mode CONFIGURATION
Usage
Information
The authentication key must match the key configured on the TACACS+ server. You cannot enter
spaces in the key. The show running-configuration output displays both unencrypted and
encrypted keys in encrypted format. Configure the global timeout allowed for authentication requests
on TACACS+ servers by using the tacacs-server timeout command. By default, OS10 times out
an authentication attempt on a TACACS+ server after five seconds. The no version of this command
removes a TACACS+ server configuration.
Example
OS10(config)# tacacs-server host 1.5.6.4 key secret1
Supported
Releases
10.4.0E(R2) or later
tacacs-server timeout
Configures the global timeout used for authentication attempts on TACACS+ servers.
Syntax
tacacs-server timeout seconds
Parameters seconds Enter the timeout period used to wait for an authentication response from a TACACS+
server (1 to 1000 seconds).
Default 5 seconds
Command Mode CONFIGURATION
Usage
Information
The no version of this command resets the TACACS+ server timeout to the default.
Example
OS10(config)# tacacs-server timeout 360
Supported
Releases
10.4.0E(R2) or later
username password role
Creates an authentication entry based on a user name and password, and assigns a role to the user.
Syntax
username username password password role role
Parameters
username username Enter a text string (up to 32 alphanumeric characters; 1 character
minimum).
password password Enter a text string (up to 32 alphanumeric characters; 9 characters
minimum).
role role Enter a user role:
sysadmin Full access to all commands in the system, exclusive access to commands that
manipulate the file system, and access to the system shell. A system administrator can create user
IDs and user roles.
secadmin Full access to configuration commands that set security policy and system access,
such as password strength, AAA authorization, and cryptographic keys. A security administrator
can display security information, such as cryptographic keys, login statistics, and log information.
512 System management