Users Guide

inherit existing-role-
name
Enter the inherit keyword then specify the system dened role to inherit permissions
from (sysadmin, secadmin, netadmin, netoperator).
Defaults none
Command Modes CONFIGURATION
Command History
This guide is platform-specic. For command information about other platforms, see the relevant Dell Networking
OS Command Line Reference Guide.
Version Description
9.10(0.0) Introduced on the S6100-ON.
9.8(1.0) Introduced on the Z9100-ON.
9.8(0.0P5) Introduced on the S4048-ON.
9.8(0.0P2) Introduced on the S3048-ON.
9.7(0.0) Introduced on the S6000-ON.
9.5(0.0) Introduced on the Z9000, S6000, S4820T, S4810, and MXL.
Usage Information
By default, access to commands are determined by the user’s role (if dened) or by the user’s privilege level. If the
aaa authorization role-only command is enabled, then only the user’s role is used.
Before you enable role-based only AAA authorization:
1 Locally dene a system administrator user role.This will give you access to login with full permissions even if
network connectivity to remote authentication servers is not available.
2 Congure login authentication on the console. This ensures that all users are properly identied through
authentication no matter the access point
3 Specify an authentication method (RADIUS, TACACS+, or Local).
4 Specify authorization method (RADIUS, TACACS+ or Local).
5 Verify the conguration has been applied to the console or VTY line.
Related Commands login authentication, password, radius-server host, tacacs-server host
role
Changes command permissions for roles.
Syntax
role mode { { { addrole | deleterole } role-name } | reset } command
To delete access to a command, use the no role mode role-name
Parameters
mode
Enter one of the following keywords as the mode for which you are controlling access:
congure for CONFIGURATION mode
exec for EXEC mode
interface for INTERFACE modes
Security 1423