AAA
The AAA tab displays details of the AAA servers available on the Nexus Dashboard Data Broker. For more details about AAA servers, see About AAA Servers.
A table with the following details is displayed:
Column Name |
Description |
---|---|
Server Address |
The IP address of the AAA server. |
Protocol |
The protocol running on the server. The options are:
|
The following actions can be performed from the AAA tab:
-
Add Server—Use this to add a new AAA server. See Adding an AAA Server for the detailed procedure.
-
Delete Server—Select the server(s) to be deleted by checking the check box which is available at the beginning of the row and then click Actions > Delete AAA Server. The selected server(s) is deleted. If you choose the delete action without selecting a check box, an error is displayed. You will be prompted to select a server.
Adding an AAA Server
Use this procedure to add an AAA server.
Procedure
Step 1 |
Navigate to Administration > AAA. |
||||||||||||||||||||||||||||||||||||||||
Step 2 |
From the Actions drop down menu, select Add AAA Server. |
||||||||||||||||||||||||||||||||||||||||
Step 3 |
In the Add AAA Server dialog box, enter the following details:
|
||||||||||||||||||||||||||||||||||||||||
Step 4 |
Click Add AAA Server to add the server. |
What to do next
Configuring User Authentication for RADIUS Server
User authorization on a RADIUS server must conform to the Cisco Attribute-Value (av-pair) format. In the RADIUS server, configure the Cisco av-pair attribute for a user as follows:
shell:roles="Network-Admin Slice-Admin"
About AAA Servers
AAA enables the security appliance to determine who the user is (authentication), what the user can do (authorization), and what the user did (accounting). Cisco Nexus Dashboard Data Broker uses Remote Authentication Dial-In User Service (RADIUS) or Terminal Access Controller Access-Control System Plus (TACACS+) to communicate with an AAA server.
AAA server supports remote authentication and authorization. To authenticate each user, Cisco Nexus Dashboard Data Broker uses both the login credentials and an attribute-value (AV) pair. An AV pair assigns the authorized role for the user as part of the user administration. After successful authentication, the Cisco AV pair is returned to Cisco Nexus Dashboard Data Broker for resource access authorization.