Command Reference AAA Commands
login authentication
Configures a login authentication method list.
Platform
Description
N/A
aaa authorization commands
Use this command to authorize the commands executed by users that have logged in to the network
access server (NAS) command-line interface (CLI).
Use the no form of this command to disable the AAA command authorization function.
aaa authorization commands level { default | list-name} method1 [method2...]
no aaa authorization commands level { default | list-name}
Parameter Description
level
Specifies the command level to be authorized, in the range from 0 to 15. You can
run this command after the authorization of a specific command level is passed.
default
When this parameter is used, the following defined method list is used as the
default method of command authorization.
Parameter
Description
list-name
Specifies the name of a command authorization method list, which can be any
character strings.
method
It must be one of the keywords: local, none, and group. One method list can
contain up to four methods.
none
Authorization is not performed.
group
Uses a server group for authorization. Currently, the TACACS+ server group is
supported
Defaults
AAA command authorization is disabled by default.
Command
Mode
Global configuration mode
Usage Guide
RGOS supports authorization of the commands executed by users. When a user inputs and attempts
to run a command, AAA sends this command to the security server. This command will be executed if
the security server allows command execution; otherwise, it will prompt command execution denial.
You are required to specify the command level when configuring command authorization. This
specified command level is the default command level (for example, the default level of a command is
14 when the command is visible for users above level 14).
You must apply the configured command authorization method to the terminal line that requires
command authorization; otherwise, the configured command authorization method is ineffective.
Configuration
Examples
The following example uses the TACACS+ server to authorize level 15 commands.
Ruijie(config)# aaa authorization commands 15 default group tacacs+