cc/td/doc/product/software/ios121/121sup/121csum1
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Authorization Commands

Authorization Commands

This chapter explains the function and syntax of the authorization commands. For more information about defaults and usage guidelines, see the corresponding chapter of the Cisco IOS Security Command Reference, Release 12.1.

aaa authorization

To set parameters that restrict network access to a user, use the aaa authorization command in global configuration mode. To disable authorization for a function, use the no form of this command.

aaa authorization {network | exec | commands level | reverse-access} {default | list-name} method1 [method2...]

no aaa authorization {network | exec | commands level | reverse-access | default | list-name}

Syntax Description

network

Runs authorization for all network-related service requests, including SLIP, PPP, PPP NCPs, and ARA.

exec

Runs authorization to determine if the user is allowed to run an EXEC shell. This facility might return user profile information such as autocommand information.

commands

Runs authorization for all commands at the specified privilege level.

level

Specific command level that should be authorized. Valid entries are
0 through 15.

reverse-access

Runs authorization for reverse access connections, such as reverse Telnet.

default

Uses the listed authorization methods that follow this argument as the default list of methods for authorization.

list-name

Character string used to name the list of authorization methods.

method1 [method2...]

One of the keywords listed in Table 38.

Table 38 describes method keywords.


Table 38: aaa authorization Methods
Keyword Description

group radius

Uses the list of all RADIUS servers for authentication.

group tacacs+

Uses the list of all TACACS+ servers for authentication.

group group-name

Uses a subset of RADIUS or TACACS+ servers for authentication as defined by the aaa group server radius or aaa group server tacacs+ command.

if-authenticated

Allows the user to access the requested function if the user is authenticated.

none

No authorization is performed.

local

Uses the local database for authorization.

krb5-instance

Uses the instance defined by the kerberos instance map command.

aaa authorization config-commands

To disable AAA configuration command authorization in the EXEC mode, use the no form of the aaa authorization config-commands command in global configuration mode. Use the standard form of this command to reestablish the default created when the aaa authorization commands level method1 command was issued.

aaa authorization config-commands

no aaa authorization config-commands

Syntax Description

This command has no arguments or keywords.

aaa authorization reverse-access

To configure a network access server to request authorization information from a security server before allowing a user to establish a reverse Telnet session, use the aaa authorization reverse-access command in global configuration mode. Use the no form of this command to restore the default value for this command.

aaa authorization reverse-access {group radius | group tacacs+}

no aaa authorization reverse-access {group radius | group tacacs+}

Syntax Description

group radius

Specifies that the network access server will request authorization from a RADIUS security server before allowing a user to establish a reverse Telnet session.

group tacacs+

Specifies that the network access server will request authorization from a TACACS+ security server before allowing a user to establish a reverse Telnet session.

authorization

To enable AAA authorization for a specific line or group of lines, use the authorization command in line configuration mode. Use the no form of this command to disable authorization.

authorization {arap | commands level | exec | reverse-access} [default | list-name]

no authorization {arap | commands level | exec | reverse-access} [default | list-name]

Syntax Description

arap

Enables authorization for line(s) configured for AppleTalk Remote Access (ARA) protocol.

commands

Enables authorization on the selected line(s) for all commands at the specified privilege level.

level

Specific command level to be authorized. Valid entries are 0 through 15.

exec

Enables authorization to determine if the user is allowed to run an EXEC shell on the selected line(s).

reverse-access

Enables authorization to determine if the user is allowed reverse access privileges.

default

(Optional) The name of the default method list, created with the aaa authorization command.

list-name

(Optional) Specifies the name of a list of authorization methods to use. If no list name is specified, the system uses the default. The list is created with the aaa authorization command.

ppp authorization

To enable AAA authorization on the selected interface, use the ppp authorization command in interface configuration mode. Use the no form of this command to disable authorization.

ppp authorization [default | list-name]

no ppp authorization

Syntax Description

default

(Optional) The name of the method list is created with the aaa authorization command.

list-name

(Optional) Specifies the name of a list of authorization methods to use. If no list name is specified, the system uses the default. The list is created with the aaa authorization command.


hometocprevnextglossaryfeedbacksearchhelp
Posted: Wed Jul 26 16:11:46 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.