Juniper Networks
Log in
|
How to Buy
|
Contact Us
|
United States (Change)
Choose Country
Close

Choose Country

North America

  • United States

Europe

  • Deutschland - Germany
  • España - Spain
  • France
  • Italia - Italy
  • Россия - Russia
  • United Kingdom

Asia Pacific

  • Asean Region (Vietnam, Indonesia, Singapore, Malaysia)
  • Australia
  • 中国 - China
  • India
  • 日本 - Japan
  • 대한민국 - Korea
  • 台灣 - Taiwan
Solutions
Products & Services
Company
Partners
Support
Education
Community
Security Intelligence Center

Technical Documentation

Support
Technical Documentation
Content Explorer New
 
Enterprise MIBs
 
EOL Documentation
 
Feature Explorer Login required New
 
File Format Help
 
Glossary
 
Portable Libraries
 
 
Home > Support > Technical Documentation > JunosE Software > aaa authorization
Print
Rate and give feedback:  Feedback Received. Thank You!
Rate and give feedback: 
Close
This document helped resolve my issue.  Yes No

Additional Comments

800 characters remaining

May we contact you if necessary?

Name:  
E-mail: 
Submitting...

aaa authorization

Syntax

aaa authorization { exec | commands level } authorListName authMethod
[ authMethod ]*

no aaa authorization { exec | commands level } authorListName

Release Information

Command introduced before JunosE Release 7.1.0.

Description

Sets parameters that restrict a user's access to a network. The no version disables authorization for a function.

Options

  • exec—Runs authorization to determine if the user is allowed to run Exec mode commands
  • level—Privilege level of commands for which authorization is run; in the range 0–15
  • authorListName—Name of the authorization methods list of up to 32 characters
  • authMethod—Authorization method lists define the way authorization is performed and the sequence in which the methods are performed. You can designate one or more security protocols in the method list to be used for authorization. If the initial method fails, the next method in the list is used. The process continues until either there is successful communication with a listed authorization method or all methods defined are exhausted:
    • if-authenticated—Allows the user to access the requested function if the user is authenticated
    • none—NAS does not request authorization information; authorization is not performed over this line
    • tacacs+—NAS exchanges authorization information with the TACACS+ security daemon

    Note: For information about TACACS+, see JunosE Broadband Access Configuration Guide.

  • *—Indicates that one or more parameters can be repeated multiple times in a list in the command line

Mode

Global Configuration

Published: 2012-06-28

 
  • About Juniper
  • Investor Relations
  • Press Releases
  • Newsletters
  • Juniper Offices
  • Green Networking
  • Resources
  • How to Buy
  • Partner Locator
  • Image Library
  • Visio Templates
  • Security Center
  • Community
  • Forums
  • Blogs
  • Junos Central
  • Social Media
  • Developers
  • Support
  • Technical Documentation
  • Knowledge Base (KB)
  • Software Downloads
  • Product Licensing
  • Contact Support
Site Map / RSS Feeds / Careers / Accessibility / Feedback / Privacy & Policy / Legal Notices
Copyright© 1999-2012 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out