beautypg.com

H3C Technologies H3C Intelligent Management Center User Manual

Page 6

background image

i

Contents

1 TACACS+ Authentication Manager overview ······································································································· 1

 

TAM features ····································································································································································· 1

 

Reliable identity authentication ······························································································································· 1

 

Simple user management ········································································································································ 1

 

Strict and refined user privilege control ················································································································· 2

 

High-performance, expansible deployment solutions ··························································································· 2

 

TAM functional structure ··················································································································································· 2

 

TAM user types ························································································································································· 3

 

Condition-based authorization································································································································ 3

 

Login authorization and command authorization ································································································· 3

 

Online user management ········································································································································ 3

 

Log management ······················································································································································ 3

 

Login methods and authentication-authorization methods ···························································································· 4

 

TAM local authentication and authorization ········································································································· 4

 

LDAP authentication + TAM local authorization ··································································································· 5

 

2 Configuring device user authentication ·················································································································· 7

 

Configuring TAM local authentication and authorization ···························································································· 7

 

Configuring TAM ······················································································································································ 8

 

Configuring a device ············································································································································ 11

 

Configuring the PC of the device user ················································································································ 13

 

Configuring LDAP authentication + TAM local authorization ··················································································· 13

 

Configuring an LDAP server ································································································································· 13

 

Configuring TAM ··················································································································································· 13

 

Configuring a device ············································································································································ 18

 

Configuring the PC of the device user ················································································································ 19

 

Comparing the authentication-authorization methods ······························································································· 19

 

3 TAM functions and common operations ··············································································································· 21

 

TAM functions ································································································································································· 21

 

Common operations ······················································································································································ 22

 

Sorting a list ··························································································································································· 22

 

Navigating a list ···················································································································································· 22

 

4 Performing device-related configuration ··············································································································· 23

 

Viewing the device list ··················································································································································· 23

 

Querying devices ··························································································································································· 24

 

Viewing device details ·················································································································································· 24

 

Adding a device ···························································································································································· 25

 

Importing devices ··························································································································································· 28

 

Modifying a device ························································································································································ 30

 

Batch modifying devices ··············································································································································· 30

 

Batch deleting devices ··················································································································································· 31

 

Modifying the device area and type ··························································································································· 32

 

5 Managing authorization conditions ······················································································································ 33

 

Managing device areas ················································································································································ 33

 

Viewing the device area list ································································································································· 33

 

Viewing device area details ································································································································· 34

 

Adding a device area ··········································································································································· 34

 

Adding a sub-area ················································································································································ 35