HP Intelligent Management Center v5.1 TACACS+ Authentication Manager Administrator Guide
1
1 TACACS+ Authentication Manager overview
To centrally manage network maintainers, HP delivers the TACACS+ Authentication Manager (TAM).
TAM operates based on the IMC platform to provide authentication, authorization, and auditing for
network maintainers. After TAM is deployed on the IMC server, the server is capable of performing
TACACS+ authentication.
TAM supports the following services:
• Authentication—Authenticates maintainers to make sure that only valid maintainers can log in to
devices.
• Authorization—Assigns different device management privileges to different maintainers, so they
can perform only authorized operations on devices.
• Audit—Audits maintainers by monitoring and recording their online behaviors.
• Collaboration—Cooperates with the mainstream TACACS+ supporting devices, such as HP
devices, H3C devices, and Cisco devices.
TAM features
Reliable identity authentication
• Authentication by account name and password.
• Multiple password transmission methods, such as PAP, CHAP, and ASCII, to satisfy different
network scenarios.
• LDAP authentication by LDAP servers such as Windows AD, OpenLDAP, and third-party mail
systems that support the LDAP protocol.
Simple user management
• User type—Supports two user types, common device user and LDAP user. Different types of users
are suitable for different network scenarios.
• Batch operation—Supports abundant batch operations, such as batch open/cancel/modify
accounts.
• Blacklist—Adds suspicious device users to the blacklist to prevent attacks.
• User group—Assigns users of the same type to one group for unified management, reducing device
maintenance work for operators and facilitating operator privilege assignment.
• Online user monitoring—Monitors information about online users, including the login device IP,
user IP, and online duration.
• Logging—Records the authentication, authorization, and audit logs for device users, helping
operators to monitor user logins and audit their device management behaviors.