Table of Contents

Authentication

Users

The Users tab allows users logged in as administrators to add new users or edit existing users and their privilege levels. Depending on the selected role, the user has the following rights:

The minimum requirements for the passwords are as follows:

The Allow External Authentication option allows the user's credentials to be used to log into devices on which Shared Authentication was enabled (see Centralized Authentication).

TACACS+

The TACACS+ tab allows adding one or more TACACS+ servers, and configuring the following details:

The Allow External Authentication option allows the user credentials defined on the TACACS+ server to be used to log into devices on which Shared Authentication was enabled (see Centralized Authentication).

RADIUS

The RADIUS tab allows adding one or more RADIUS servers, and configuring the following details:

The Allow External Authentication option allows the user credentials defined on the RADIUS server to be used to log into devices on which Shared Authentication was enabled (see Centralized Authentication).

Custom authentication configuration

Supervisor allows users to not only define multiple authentication methods, but also to configure how the different methods are used by the system. Clicking the Configure Authentication button on either the Users, TACACS+, or RADIUS page allows users to see the list of available authentication methods and change their priority and activation strategy.

For each method, one of the following strategies can be selected:

Centralized authentication

Supervisor provides the ability to use credentials defined in the Supervisor itself in order to log into devices it manages. Devices on which Shared Authentication was enabled will be able to use Supervisor credentials, be they Local Users, or users defined on TACACS+ or RADIUS servers, on which Allow External Authentication was enabled. The Centralized Authentication follows the Supervisor's Custom Authentication Configuration.