HP Intelligent Management Center v5.1 TACACS+ Authentication Manager Administrator Guide
2
Strict and refined user privilege control
• Scenario-based authorization—Authorizes device users according to different access scenarios.
Three elements define a scenario: login time, login device IP, and login device type.
• Login authorization and command authorization—Login authorization controls login behaviors of
device users. Command authorization specifies the commands that device users can execute.
• Limit on the number of concurrent users of one account.
High-performance, expansible deployment solutions
• Two installation environments: "PC server + Windows + SQL Server" and "PC server + Linux +
Oracle."
• Distributed deployment.
TAM functional structure
TAM functions based on the device user + authorization policy structure. See Figure 1.
Figure 1 TAM functional structure