Setting up AAA for REST
Enable the following command to get manager privilege for RADIUS and TACACS authorization.
aaa authentication login privilege-mode
Syntax
aaa authentication login privilege-mode
Usage
[no] aaa authentication login privilege-mode
Description
Specify that switch respects the authentication server's privilege level.
The following sections list the procedure to setup AAA for REST on Local, RADIUS, and TACACS+. For command details, see CLI Commands
RADIUS
The RADIUS server must be configured and the configuration file must be available on the RADIUS server.
- Authentication - Configure Operator and Manager with primary authentication method as RADIUS and backup method as Local. The commands are:
(config)# aaa authentication rest login radius (config)# aaa authentication rest enable radius
- Authorization - Configure the HP-URI-Exception, HP-URI-Json-String, HP-URI-Access in the RADIUS configuration file. Use the following command to configure URI authorization on the switch:
(config)# aaa authorization rest-uri radius
- Accounting - Enable the URI, exec and system accounting on RADIUS for REST interface using the
aaa accounting
command. For example,(config)# aaa accounting exec start-stop radius (config)# aaa accounting system start-stop radius (config)# aaa accounting rest-uri stop-only radius
TACACS+
-
Authentication
Configure Operator and Manager with primary authentication method as TACACS and backup method as Local. The commands are:(config)# aaa authentication rest login tacacs (config)# aaa authentication rest enable tacacs - Authorization
- Configure the rules for authorization in the TACACS configuration file.
- Enable TACACS authorization using the following command:
(config)# aaa authorization rest-uri tacacs
-
Accounting
Enable the URI, exec and system accounting on TACACS+ server for REST interface using theaaa accounting
command with appropriate options. For example,(config)# aaa accounting exec start-stop tacacs (config)# aaa accounting system start-stop tacacs (config)# aaa accounting rest-uri stop-only tacacs
Local
-
Authentication
Configure Operator and Manager with primary authentication method as Local. The commands are:(config)# aaa authentication rest login local (config)# aaa authentication rest enable local -
Authorization
The following is an example illustrates the configuration to authorize admin1 to execute authentication GET URIs:- Enable Local authorization:
(config)# aaa authorization rest-uri local
- Create a group, group1 with the following parameters and command:
URI: v6/aaa Json attribute: authentication URI Access: GET Exception: permit (config)# aaa authorization group group1 uri-seq 23 match-uri v6/aaa match-json authentication uri-access get permit
- Create Local user and associate the user with the group.
(config)# aaa authentication local-user admin1 group group1 password plaintext New password for user1: ********* Please retype new password for user1: *********With the execution of the above two commands, admin1 is part of group1, which has authorization set to execute authentication GET URIs.
- Enable Local authorization: