Configuration Guide AAA Commands
Global configuration mode
RGOS supports authorization of the commands executed by the users. When the users input and
attempt to execute a command, AAA sends this command to the security server. This command is to
be executed if the security server allows to. Otherwise, it will prompt command deny.
It is necessary to specify the command level when configuring the command authorization, and this
specified command level is the default command level.
The configured command authorization method must be applied to terminal line which requires the
command authorization. Otherwise, the configured command authorization method is ineffective.
The following example uses the TACACS+ server to authorize the level 15 command.
Ruijie(config)# aaa authorization commands 15 default group tacacs+
Enables the AAA security service.
Applies the command authorization for the terminal line.
1.11 aaa authorization config-commands
Use this command to authorize the configuration commands (including in the global configuration
mode and its sub-mode).
Use the no form of this command to restore the default setting.
aaa authorization config-commands
no aaa authorization config-commands
This function is disabled by default.
Global configuration mode
If you only authorize the commands in the non-configuration mode (for example, privileged EXEC
mode), you can use the no form of this command to disable the authorization function in the
configuration mode, and execute the commands in the configuration mode and its sub-mode without
command authorization.
The following example enables the configuration command authorization function.
Ruijie(config)# aaa authorization config-commands