HP Intelligent Management Center v5.1 TACACS+ Authentication Manager Administrator Guide
49
6 Authorization policy
An authorization policy defines multiple authorization scenarios, and assigns each scenario one shell
profile and one command set. Scenarios in the same authorization policy have different priorities.
Administrators can assign authorization policies to individual device users or device user groups.
When a device user matches one scenario in an authorization policy, TAM applies the shell profile and
command set of the scenario to the user for device management. If the device user matches multiple
scenarios, TAM applies the highest-priority scenario settings to the user. For more information about shell
profiles and command sets, see "Authorization command."
An authorization scenario is identified by the combination of the following elements: device area, device
type, and authorized time range. For more information about authorization scenarios, see
"Authorization scenarios."
Viewing the authorization policy list
To view the authorization policy list:
1. Click the Service tab.
2. Select TACACS+ AuthN Manager > Authorization Policies from the navigation tree.
The Authorization Policy List displays all authorization policies.
Authorization Policy List contents
Policy Name—Name of the authorization policy, which must be unique in TAM. Click the name
link of an authorization policy to view its details.
Description—Description of the authorization policy.
Modify—Click the Modify icon to modify the authorization policy.
Delete—Click the Delete icon to delete an authorization policy.
3. Click Refresh in the Authorization Policy List area to update the authorization policy list.
Viewing authorization policy details
To view detailed information about an authorization policy:
1. Click the Service tab.
2. Select TACACS+ AuthN Manager > Authorization Policies from the navigation tree.
The Authorization Policy List displays all authorization policies.
3. Click the name link of an authorization policy to enter the authorization policy details page.
Basic Information
Authorization Policy Name—Name of the authorization policy.
Description—Description of the authorization policy.
Access Authorization Info
Each entry in the Access Authorization Info list represents a separate authorization rule, which
defines the shell profile and command set to be applied to the login users in a specific scenario.