The controller or service platform authenticates users using the integrated local database. When user credentials are presented the controller or service platform validates the username and password against the local database and assigns permissions based on the associated roles assigned. The controller or service platform can also deny the authentication request if the user is attempting to access a management interface not specified in the account‘s access mode list.
user <USERNAME> password [0 <PASSWORD>|1 <SHA1-PASSWORD>|<PASSWORD>] role [device-provisioning-admin|helpdesk|
rest-api-user|monitor|network-admin|security-admin|superuser|system-admin|vendor-admin|web-user-admin]
user <USERNAME> password [0 <PASSWORD>|1 <SHA1-PASSWORD>|<PASSWORD>] role [device-provisioning-admin|helpdesk|
rest-api-user|monitor|network-admin|security-admin|superuser|system-admin|web-user-admin]
access [all|console|ssh|telnet|web] ({allowed-locations <ALLOWED-LOCATIONS>})
user <USERNAME> password [0 <PASSWORD>|1 <SHA1-PASSWORD>|<PASSWORD>] role vendor-admin group <VENDOR-GROUP-NAME>
user <USERNAME> password [0 <PASSWORD>|1 <SHA1-PASSWORD>|<PASSWORD>] role [device-provisioning-admin|helpdesk|
rest-api-user|monitor|network-admin|security-admin|superuser|system-admin|web-user-admin]
access [all|console|ssh|telnet|web] ({allowed-locations <ALLOWED-LOCATIONS>})
user <USERNAME> | Adds a new user account to this management policy
|
password [0 <PASSWORD>| 1 <SHA1-PASSWORD>| <PASSWORD>] | Configures a password for this user
|
role | Configures the user role. The options are:
Note: Please see
succeeding table for 'vendor-admin' role details.
|
access [all|console|ssh| telnet|web] | Configures the services this user can use for remote device access
|
allowed-locations <ALLOWED-LOCATIONS> | Optional. This keyword is recursive and optional. It associates an
allowed-locations tag with this user. When associated, the user can only
access the RF Domains/sites/tree-node paths associated with the specified
'allowed-locations' tag.
Note:
The "allowed-locations" parameter is only applicable to the WiNGdevice-provisioning-admin role user. Please refer to the Examples: Restricting User Access to Devices in Specific Locations section of this topic for configuration details. Note: For information
on configuring the allowed-locations tag, see allowed-locations.
|
user <USERNAME> password [0 <PASSWORD>|1 <SHA1-PASSWORD>|<PASSWORD>] role vendor-admin group <VENDOR-GROUP-NAME>
user <USERNAME> | Adds a new user account to this management policy
|
password [0 <PASSWORD>| 1 <SHA1-PASSWORD>| <PASSWORD>] | Configures a password
|
role vendor-admin | Configures this user‘s role as vendor-admin. Once created, the
vendor-admin can access the online device-registration portal to add devices
to the RADIUS vendor group to which he/she belongs. Vendor-admins have only
Web access to the device registration portal. The WiNG software allows multiple vendors to securely on-board their devices through a single SSID. Each vendor has a ‘vendor-admin‘ user who is assigned a unique, username/password credential for RADIUS server validation. Successfully validated vendor-admins can on-board their devices, which are, on completion of the on-boarding process, immediately placed on the vendor-allowed VLAN. If assigning the vendor-admin role, provide the vendor's group name for RADIUS authentication. The vendor's group takes precedence over the statically configured group for device registration. Note: Use the
service > show > wireless > credential-cache
command to view on-boarded device‘s VLAN assignment. Ensure that
the REST server is enabled, to allow vendor users access to the online
device registration portal.Note: By default the REST server
is enabled. For more information, see rest-server.
|
group <VENDOR-GROUP-NAME> | Associates this vendor-admin user with a vendor
group, required for RADIUS authentication. The vendor group should be
existing and configured in the RADIUS group policy. For more information on
configuring RADIUS groups, see radius-group.
|
nx9500-6C8809(config-management-policy-test)#user TESTER password test123 role superuser access all
nx9500-6C8809(config-management-policy-test)#show context management-policy test telnet port 200 no http server https server ftp username superuser password 1 f617ca50c59fb47028f96db4baab5f3d8f03c03ab257960b0fd127c69f02cd7e rootdir dir ssh port 162 user TESTER password 1 b6b37c51405f4e93c67fe8af82d450c9fd6af69324cd56a55055cefe695b6a14 role superuser access all snmp-server community snmp1 ro snmp-server user snmpmanager v3 encrypted des auth md5 0 test@123 snmp-server host 172.16.10.23 v3 162 aaa-login radius external aaa-login radius policy test idle-session-timeout 0 restrict-access host 172.16.10.2 log all nx9500-6C8809(config-management-policy-test)#
nx9500-6C8809(config-management-policy-OB)#user test password 0 test123 role vendor-admin group Apple,Sony,Samsung
nx9500-6C8809(config-management-policy-OB)#user Samsung password 0 samsung role vendor-admin group Samsung
nx9500-6C8809(config-management-policy-OB)#show context management-policy OB telnet no http server https server rest-server ssh user admin password 1 d9849649218dcaa79109fbd47bbf1a24ecdf1edda220d21f76ce4c15a4e7e696 role superuser access all user test password 1 62fca173a1ffc0e9cc4eef782b1978a5e0c47f66bc57a32992f03e3e00fe0bc4 role vendor-admin group Apple,Sony,Samsung user Samsung password 1 39cb036b8e09c2ec625ebcda6e4001f4584263ed86fa69fc1f6b284113772eb0 role vendor-admin group Samsung nx9500-6C8809(config-management-policy-OB)#
The following set of configurations show how to use the 'allowed-locations' option to permit or deny device-provisioning-admin users access to devices within specific RF Domains/sites.
rf-domain default country-code us
rf-domain California no country-code tree-node country us region CA
rf-domain SanJose no country-code tree-node country us region CA city SJ
rf-domain SJCollege no country-code tree-node country us region CA city SJ campus SJCollege
management-policy AccessControl telnet no http server https server rest-server ssh user admin password 1 superuser role superuser access all allowed-location test1 locations US allowed-location test2 locations /US/CA/SJ/SJCollege
Note
In the above configuration, allowed-location test1 includes the entire location 'US'. Whereas, allowed-location test2 only contains the site 'SJCollege'. By assigning 'test1' or 'test2' to a user you can provide access across location 'US' or restrict access to the site 'SJCollege' respectively.management-policy AccessControl telnet no http server https server rest-server ssh user admin password 1 superuser role superuser access all user dev-admin password 1 test123 role device-provisioning-admin access all
Note
Since allowed-locations parameter has not been specified, this user will have access to all locations 'default', 'California', 'SanJose' and 'SJCollege'.management-policy AccessControl telnet no http server https server rest-server ssh user admin password 1 superuser role superuser access all user dev-admin password 1 test123 role device-provisioning-admin access all user dev-admin1 password 1 test112233 role device-provisioning-admin access all allowed-locations test1
Note
Since the allowed-location assigned is 'test1', this user will have access to all RF Domains ('California', 'SanJose' and 'SJCollege') within location 'US'. However, the user will NOT be able to access RF Domain 'default'.management-policy AccessControl telnet no http server https server rest-server ssh user admin password 1 superuser role superuser access all user dev-admin password 1 test123 role device-provisioning-admin access all user dev-admin1 password 1 test112233 role device-provisioning-admin access all allowed-locations test1 user dev-admin2 password 1 test556677 role device-provisioning-admin access all allowed-locations test2
Note
Since the allowed-location assigned is 'test2', this user's access will be restricted to the location 'SJCollege'.The following example shows how to restrict a device-provisioning-admin user's access to devices in a specific RF Domain.
rf-domain Global no country-code
management-policy AccessControl telnet http server https server rest-server ssh allowed-location test1 locations US allowed-location test2 locations /US/CA/SJ/SJCollege allowed-location RFD locations Global user admin password 1 superuser role superuser access all user dev-admin password 1 test123 role device-provisioning-admin access all user dev-admin1 password 1 test112233 role device-provisioning-admin access all allowed-locations test1 user dev-admin2 password 1 test556677 role device-provisioning-admin access all allowed-locations test2 user dev-admin3 password 1 test8899 role device-provisioning-admin access all allowed-locations RFD
no | Removes a user account configuration |