[RADIATOR] AuthorizeGroup permissions with TACACS
Amanda Myer
myer.amanda at acd.net
Tue Jul 8 13:54:38 CDT 2008
Hello,
I'm trying to pass per command authorizations to my cisco routers from
the radiator TACACS server but it doesn't seem to be working.
I'm not sure if I have something configured incorrectly or what, but
this is what I have in the <ServerTACACSPLUS> tag.
AuthorizeGroup manager permit service=shell cmd=show
cmd-arg=.*
AuthorizeGroup manager permit service=shell cmd=ip cmd-arg.*
cmd=configure cmd-arg.*
AuthorizeGroup manager permit service=shell cmd=configure
cmd-arg.*
AuthorizeGroup manager deny .*
When I try to login to the cisco router with these settings, it
authenticates the user but then doesn't authorize them for shell access
and disconnects the user.
This is what shows in the radiator log:
********************
Tue Jul 8 15:11:05 2008: DEBUG: TacacsplusConnection request 192, 1, 5,
0, 2433281923, 15
Tue Jul 8 15:11:05 2008: DEBUG: TacacsplusConnection Authentication
CONTINUE 0, passwordRemoved,
Tue Jul 8 15:11:05 2008: DEBUG: TACACSPLUS derived Radius request
packet dump:
Code: Access-Request
Identifier: UNDEF
Authentic: <16><227>v<219><199>Pq'<144>"a"<143>#<239><204>
Attributes:
NAS-IP-Address = 207.179.90.131
NAS-Port-Id = "tty3"
Calling-Station-Id = "69.63.233.88"
Service-Type = Login-User
NAS-Identifier = "TACACS"
User-Name = "holcomb.frank"
User-Password = passwordRemoved
Tue Jul 8 15:11:05 2008: DEBUG: Handling request with Handler
'NAS-Identifier=TACACS'
Tue Jul 8 15:11:05 2008: DEBUG: Deleting session for holcomb.frank,
207.179.90.131,
Tue Jul 8 15:11:05 2008: DEBUG: Handling with Radius::AuthSQL
Tue Jul 8 15:11:05 2008: DEBUG: Handling with Radius::AuthSQL: ACDEmployees
Tue Jul 8 15:11:05 2008: DEBUG: Query is: 'SELECT
ADMIN_EMPLOYEES.PASSWORD, ADMIN_EMPLOYEES_CISCO_SECURITY.DESCRIPTION
from Admin_Employees, ADMIN_EMPLOYEES_CISCO_SECURITY where
ADMIN_EMPLOYEES.username ='holcomb.frank' and
ADMIN_EMPLOYEES.stillemployed = 1 AND ADMIN_EMPLOYEES.CISCOSECURITYLEVEL
= ADMIN_EMPLOYEES_CISCO_SECURITY.ID':
Tue Jul 8 15:11:05 2008: DEBUG: Radius::AuthSQL looks for match with
holcomb.frank [holcomb.frank]
Tue Jul 8 15:11:05 2008: DEBUG: Radius::AuthSQL ACCEPT: : holcomb.frank
[holcomb.frank]
Tue Jul 8 15:11:05 2008: DEBUG: AuthBy SQL result: ACCEPT,
Tue Jul 8 15:11:05 2008: DEBUG: Access accepted for holcomb.frank
Tue Jul 8 15:11:05 2008: DEBUG: Packet dump:
*** Reply to TACACSPLUS request:
Code: Access-Accept
Identifier: UNDEF
Authentic: <16><227>v<219><199>Pq'<144>"a"<143>#<239><204>
Attributes:
tacacsGroup = manager
Tue Jul 8 15:11:05 2008: DEBUG: TacacsplusConnection result Access-Accept
Tue Jul 8 15:11:05 2008: DEBUG: TacacsplusConnection Authentication
REPLY 1, 0, ,
Tue Jul 8 15:11:05 2008: DEBUG: TacacsplusConnection disconnected from
207.179.90.131:11861
Tue Jul 8 15:11:05 2008: DEBUG: New TacacsplusConnection created for
207.179.90.131:60500
Tue Jul 8 15:11:05 2008: DEBUG: TacacsplusConnection request 192, 2, 1,
0, 3484511561, 56
Tue Jul 8 15:11:05 2008: DEBUG: TacacsplusConnection Authorization
REQUEST 6, 1, 1, 1, holcomb.frank, tty3, 69.63.233.88, 2, service=shell cmd*
Tue Jul 8 15:11:05 2008: DEBUG: AuthorizeGroup rule match found: permit
.* { }
Tue Jul 8 15:11:05 2008: INFO: Authorization permitted for
holcomb.frank, group manager, args service=shell cmd*
Tue Jul 8 15:11:05 2008: DEBUG: TacacsplusConnection Authorization
RESPONSE 1, , ,
Tue Jul 8 15:11:05 2008: DEBUG: TacacsplusConnection disconnected from
207.179.90.131:60500
***********************
Thanks for any help you can provide! I'm new to radius and tacacs so
please bear with me.
Thanks
-Amanda
More information about the radiator
mailing list