BLADE OS™ Application Guide HP GbE2c Ethernet Blade Switch for c-Class BladeSystem Version 5.1 Advanced Functionality Software

Table Of Contents
BLADE OS 5.1 Application Guide
48 Chapter 1: Accessing the Switch BMD00113, September 2009
Authorization
Authorization is the action of determining a users privileges on the device, and usually takes place
after authentication.
The default mapping between TACACS+ authorization levels and BLADE OS management access
levels is shown in Table 4. The authorization levels listed in this table must be defined on the
TACACS+ server.
Alternate mapping between TACACS+ authorization levels and BLADE OS management access
levels is shown in Table 5. Use the /cfg/sys/tacacs/cmap ena command to use the
alternate TACACS+ authorization levels.
You can customize the mapping between TACACS+ privilege levels and GbE2c management
access levels. Use the /cfg/sys/tacacs/usermap command to manually map each
TACACS+ privilege level (0-15) to a corresponding GbE2c management access level.
If the remote user is successfully authenticated by the authentication server, the switch verifies the
privileges of the remote user and authorizes the appropriate access. The administrator has an option
to allow backdoor access via Telnet (/cfg/sys/tacacs/bckdoor). The default value for
Telnet access is disabled. The administrator also can enable secure backdoor
(/cfg/sys/tacacs/secbd), to allow access if both the primary and the secondary TACACS+
servers fail to respond.
Table 4 Default TACACS+ Authorization Levels
BLADE OS User Access Level TACACS+ Level
user 0
oper 3
admin 6
Table 5 Alternate TACACS+ Authorization Levels
BLADE OS User Access Level TACACS+ Level
user 0–1
oper 6–8
admin 14–15