AAA Server Authentication

Complete AAA-based authentication for the AAA server by performing one of the following steps.

  1. Enable Default Role Mapping to map the external AAA users to a single SZ local admin user.
  2. Apply the permissions of AAA users on SZ using the corresponding AAA server attributes.

    Following is an example:

    1. Create three user groups with the following access permissions in SZ:
      • Group1 with SZ super permission
      • Group2 with SZ AP admin permission
      • Group3 with SZ read-only permission
    2. Create three SZ local users corresponding to the user groups as follows:
      • Bind User1 with Group1
      • Bind User2 with Group2
      • Bind User3 with Group3
      NOTE
      Following are the attribute values on AAA servers:
      • RADIUS: Ruckus-WSG-User=User1 or User2 or User3.
      • TACACS+: user-name=User1 or User2 or User3.
      • Active Directory and LDAP: Group cn=Ruckus-WSG-User1 or cn=Ruckus-WSG-User2 or cn=Ruckus-WSG-User3.
    3. Select Administrator > Admins and Roles > AAA and click Create to create an Admin AAA profile.

      Refer to Configuring AP AAA Servers.