HP Intelligent Management Center v5.1 TACACS+ Authentication Manager Administrator Guide

4
Online user management
Use this function to view basic information about users that have logged in to a device, and trace the
online behaviors of the users.
Log management
Logs include authentication logs, authorization logs, and audit logs. These logs record the device login,
usage, and logoff behaviors of device users. Operators can query the logs for auditing device users.
Login methods and authentication-authorization
methods
A TAM authentication system comprises TAM, managed devices, and device users.
TAM supports authenticating and authorizing the device users who log in to the devices through these
methods:
Telnet
Console
SSH
FTP
TAM local authentication and authorization
LDAP authentication + TAM local authorization.
To log in to a device, a device user only needs to use the client software (corresponding to the login mode)
to initiate a login request.
Refer to the following information for details about the authentication-authorization methods.
TAM local authentication and authorization
The device to which a user wants to log in sends the user account name and password to TAM. TAM
authenticates the user to allow or deny user login. If the user is permitted login to the device, TAM
performs login authorization and command authorization for the user. The entire
authentication-authorization exchange process is performed over the TACACS+ protocol.
Device user information and the authorization policy assigned to the device user are all saved in the TAM
local database.