AAA Server Authentication
Complete AAA-based authentication for the AAA server by performing one of the following steps.
-
Enable
Default Role Mapping to map the external AAA users to a single SZ local admin user.
-
Apply the permissions of AAA users on SZ using the corresponding AAA server attributes.
Following is an example:
- Create three user groups with the following access permissions in SZ:
- Group1 with SZ super permission
- Group2 with SZ AP admin permission
- Group3 with SZ read-only permission
- Create three SZ local users corresponding to the user groups as follows:
- Bind User1 with Group1
- Bind User2 with Group2
- Bind User3 with Group3
NOTEFollowing are the attribute values on AAA servers:- RADIUS: Ruckus-WSG-User=User1 or User2 or User3.
- TACACS+: user-name=User1 or User2 or User3.
- Active Directory and LDAP: Group cn=Ruckus-WSG-User1 or cn=Ruckus-WSG-User2 or cn=Ruckus-WSG-User3.
- Select
Administrator > Admins and Roles > AAA and click
Create to create an Admin AAA profile.
Refer to Configuring AP AAA Servers.
- Create three user groups with the following access permissions in SZ:
Parent topic: Working with AAA Servers