Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products

Dell Command Line Reference Guide for the S4048–ON System 9.14.2.6

aaa authorization commands

Set parameters that restrict (or permit) a user’s access to EXEC and CONFIGURATION level commands.

Syntax
aaa authorization commands {level | role role-name}{name|default} {local | tacacs+| none}

Undo a configuration with the no aaa authorization commands {level | role role-name} {name|default} {local | tacacs+ | none} command.

Parameters
commands level
Enter the keyword commands then the command privilege level for command level authorization.
role role-name
Enter the keyword role then the role name.
name
Define a name for the list of authorization methods.
default
Define the default list of authorization methods.
local
Use the authorization parameters on the system to perform authorization.
tacacs+
Use the TACACS+ protocol to perform authorization.
none
Enter the keyword none to apply no authorization.
Defaults
none
Command Modes
CONFIGURATION
Command History

This guide is platform-specific. For command information about other platforms, see the relevant Dell EMC Networking OS Command Line Reference Guide.

Version
Description
9.10(0.1)
Introduced on the S6010-ON and S4048T-ON.
9.10(0.0)
Introduced on the S3148.
9.10(0.0)
Introduced on the S6100-ON.
9.8(2.0)
Introduced on the S3100 series.
9.8(1.0)
Introduced on the Z9100-ON.
9.8(0.0P5)
Introduced on the S4048-ON.
9.8(0.0P2)
Introduced on the S3048-ON.
9.7(0.0)
Introduced on the S6000–ON.
9.5(0.0)
Added support for roles on the Z9000, S6000, S4820T, S4810, MXL
9.2(1.0)
Introduced on the Z9500.
9.0.2.0
Introduced on the S6000.
8.3.19.0
Introduced on the S4820T.
8.3.11.1
Introduced on the Z9000.
8.3.7.0
Introduced on the S4810.
7.6.1.0
Introduced on the S-Series.
7.5.1.0
Introduced on the C-Series.
6.1.1.0
Added support for RADIUS.
Usage Information

Certain TACACS+ servers do not authenticate the device if you use the aaa authorization commands level default local tacacs+ command. To resolve the issue, use the aaa authorization commands level default tacacs+ local command.


Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\