How to configure RADIUS profiles to segment user permissions in Cisco devices for RSA Authentication Manager 8.x
Originally Published: 2016-09-05
Article Number
Applies To
RSA Product Set: SecurID
RSA Product/Service Type: Authentication Manager
RSA Version/Condition: 8.x
Issue
- Customer network devices are getting authenticated through RSA Authentication Manager using an Active Directory account.
- Currently these users have full access to the network devices.
- The requirement is to grant Read-Write access for administrative users while Read-Only access for other users, the Service Desk for example.
Resolution
- Create the RSA RADIUS client for a Cisco network device. In the Security Console.
- Click RADIUS > RADIUS Clients > Add New.
- Important: For the Make/Model option select Cisco IOS 11.1 or later.
- Complete the form and click Save with associated agent. .
- Click Save.
- In the Security Console, click RADIUS > RADIUS Profiles > Add New.
- Create a RADIUS profile, selecting the Return List attribute of Cisco-AVPAIR then configure the value with shell:priv-lvl=<integer between 1 to 15>. The administrative attribute for Read-Write should be either
- The av-pair, that is shell:priv-lvl=15
or
- The attribute for read-only can be the av-pair shell:priv-lvl=1
Note that the priv-lvl value ranges from 1 to 15 depending on your router enable privilege config.
The 15 represents full admin access into the Cisco device and the lower values represent a lesser privilege than 15/full admin access.
- In the Security Console, click RADIUS > RADIUS Profiles > Manage Existing and select the profile from the context menu.
- Select Associated Users.
- Click Assign to More.
- Search for the users to link to this profile and select them.
- Click Assign Profile.
- Verify authentication with the user ID.
Related Articles
Cisco ASA - RSASecurID Access Implementation Guide 186Number of Views Radius Client Authentication failed For PIN+Token profile (New PIN Mode) with Cisco Anyconnect VPN 115Number of Views Authentication fails to RSA Authentication Manager 8.x with Cisco Adaptive Security Appliance 9.8 (2) using native SecurID… 134Number of Views Assign an Agent to a RADIUS Profile 6Number of Views RADIUSwith AM Configuration - Cisco FTD RSA Ready SecurID Access Implementation Guide 87Number of Views
Trending Articles
RSA Authentication Manager Upgrade Process RSA Release Notes for RSA Authentication Manager 8.8 RSA RADIUS Server service failed to start in the RSA Authentication Manager 8.1 Operations Console Microsoft Entra ID External MFA - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide RSA Release Notes: Cloud Access Service and RSA Authenticators
Don't see what you're looking for?