HP Intelligent Management Center v5.1 TACACS+ Authentication Manager Administrator Guide
i
Contents
1 TACACS+ Authentication Manager overview ·········································································································· 1
TAM features ····························································································································································· 1
TAM functional structure············································································································································ 2
TAM user types ················································································································································· 3
Scenario-based authorization··························································································································· 3
Login authorization and command authorization ···························································································· 3
Online user management ································································································································· 4
Log management ·············································································································································· 4
Login methods and authentication-authorization methods ······················································································· 4
TAM local authentication and authorization···································································································· 4
LDAP authentication + TAM local authorization ······························································································ 5
2 Device user authentication configuration guide ········································································································ 7
Configuring TAM local authentication and authorization ······················································································· 7
TAM ··································································································································································· 8
Configuring a device ······································································································································ 11
Configuring the PC of the device user ··········································································································· 12
Configuring LDAP authentication + TAM local authorization ················································································ 12
Configuring an LDAP server ··························································································································· 13
Configuring TAM ············································································································································ 13
Configuring a device ······································································································································ 17
Configuring the PC of the device user ··········································································································· 18
Comparing the authentication-authorization methods ··························································································· 18
3 Performing device-related configuration ··················································································································19
Viewing the device list ············································································································································ 19
Querying devices ···················································································································································· 20
Viewing device details ············································································································································ 20
Adding a device······················································································································································ 21
Importing devices ···················································································································································· 24
Modifying a device ················································································································································· 25
Batch modifying devices ········································································································································· 26
Batch deleting devices ············································································································································ 27
Modifying the device area and type ······················································································································ 27
4 Authorization scenarios ·············································································································································29
Managing device areas ·········································································································································· 29
Viewing the device area list ··························································································································· 29
Viewing device area details ··························································································································· 30
Adding a device area ···································································································································· 30
Adding a sub-area ·········································································································································· 31