Define Authorization Rights in the RADIUS User Accounts
You can provide access to the threat defense REST API from an external RADIUS server. By enabling RADIUS authentication and authorization, you can provide different levels of access rights, and not have every user log in through the local admin account.
Note |
These external users are also authorized for device manager. |
To provide role-based access control (RBAC), update the user accounts on your RADIUS server to define the cisco-av-pair attribute. This attribute must be defined correctly on a user account, or the user is denied access to the REST API. Following are the supported values for the cisco-av-pair attribute:
-
fdm.userrole.authority.admin provides full Administrator access. These users can do all actions that the local admin user can do.
-
fdm.userrole.authority.rw provides read-write access. These users can do everything a read-only user can do, and also edit and deploy the configuration. The only restrictions are for system-critical actions, which include installing upgrades, creating and restoring backups, viewing the audit log, and logging off other users.
-
fdm.userrole.authority.ro provides read-only access. These users can view dashboards and the configuration, but cannot make any changes. If the user tries to make a change, the error message explains that this is due to lack of permission.