HP Intelligent Management Center v5.1 TACACS+ Authentication Manager Administrator Guide
57
Authorization Policy—Select an authorization policy or select CLI Access Not Supported.
If you select a policy, all device users in the device user group use the policy. If you select CLI
Access Not Supported, the device users in the device user group can only log in to the device
but cannot execute commands on the device. The Authorization Policy field cannot be empty.
Parent Group Name—Do not need to configure this field.
A group created in this method is a level-1 group. Level-1 groups have no parent group. This
field displays two hyphens (--) for level-1 groups.
Description—Enter a description for the group for easy maintenance.
5. Specify the operators that can manage the device user group:
The Authorized Operators table lists all IMC operators. In terms of operation role, IMC operators
include the administrator, maintainers, and viewers. The administrator can manage all device user
groups. TAM does not allow canceling the administrator's management privileges to any device
user group.
Select the boxes next to the operators. Selected maintainers can manage the device user group.
Selected viewers can view information about the device user group.
6. Click OK.
Adding a sub-group
To add a sub-group:
1. Click the User tab.
2. Select Device User View > Device User Groups from the navigation tree.
The Device User Group List displays all device user groups.
3. Click the Add Sub-Group icon for a device user group.
The Add Device User Group page appears.
4. Configure the basic information for the device user sub-group:
Group Name—Enter the sub-group name, which must be unique in TAM.
Authorization Policy—Select an authorization policy or the CLI Access Not Supported option,
or leave this field empty.
If you select an authorization policy for the sub-group, all device users in the sub-group use the
selected authorization policy.
If you select the CLI Access Not Supported option, device users in the sub-group can only log in
to the device but cannot execute commands on the device.
If you leave this field empty, the sub-group uses the authorization policy of its parent group.
If the parent group has no authorization policy, either, the sub-group uses the authorization
policy of the upper-level group of the parent group, and so forth to the level-1 group, until a
group is matched.
Parent Group Name—Displays the parent group name of the sub-group. You do not need to
configure this field.
Description—Enter a description for the sub-group for easy maintenance.
5. Specify the operators that can manage the sub-group:
The authorized operators table lists all IMC operators. In terms of operation role, IMC operators
include the administrator, maintainers, and viewers. The administrator can manage all device user