You can configure TACACS+ authentication for
end users as well as firewall or Panorama™ administrators. You can also use a
TACACS+ server to manage administrator authorization (role and access domain
assignments) by defining Vendor-Specific Attributes (VSAs). For all users, you
must configure a TACACS+ server
profile that defines how the firewall or Panorama connects to the server.
You then assign the server profile to an
authentication profile for each set of users who require common
authentication settings. What you do with the authentication profile depends on
which users the TACACS+ server authenticates:
End users
—Assign the authentication profile to an
authentication enforcement object and assign the object to Authentication
policy rules. For the full procedure, see Configure Authentication Policy.
Administrative accounts with authorization managed locally
on the firewall or Panorama
The profile defines how the firewall connects to the TACACS+
server.
Select
Device
Server Profiles
TACACS+
or
Panorama
Server Profiles
TACACS+
on Panorama and
Add
a
profile.
Enter a
Profile Name
to identify
the server profile.
(
Optional
) Select
Administrator
Use Only
to restrict access to administrators.
Enter a
Timeout
interval in
seconds after which an authentication request times out (default
is 3; range is 1–20).
Select the
Authentication Protocol
(default
is
CHAP
) that the firewall uses to authenticate
to the TACACS+ server.
Select
CHAP
if the TACACS+ server supports that protocol; it's more secure
than
PAP
.
Add
each TACACS+ server and
enter the following:
A
Name
to identify the server.
The
TACACS+ Server
IP address or FQDN. If you use an FQDN address object
to identify the server and you subsequently change the
address, you must commit the change for the new server
address to take effect.
A
Secret
and
Confirm Secret
to encrypt usernames
and passwords.
The server
Port
for authentication requests (default is 49).
Click
OK
to save the server
profile.
Assign
the TACACS+ server profile to an authentication profile.
The authentication profile defines the authentication settings that are common to a set of
users.
Select
Device
Authentication Profile
and
Add
a
profile.
Enter a
Name
to identify the
profile.
Set the
Type
to
TACACS+
.
Select the
Server Profile
you
configured.
Select
Retrieve user group from TACACS+
to
collect user group information from VSAs defined on the TACACS+
server.
The firewall matches the group information using the groups you specify in the
Allow
List
of the authentication profile.
Select
Advanced
and in the
Allow
List
,
Add
the users and groups
that can authenticate with this authentication profile.
Click
OK
to save the authentication
profile.
Configure the firewall to use the authentication profile
for all administrators.
Select
Device
Setup
Management
and
edit the Authentication Settings.
Select the
Authentication Profile
you
configured and click
OK
.
Configure the roles and access domains that define authorization
settings for administrators.
If you already defined TACACS+ VSAs
on the TACACS+ server, the names you specify for roles and access domains
on the firewall must match the VSA values.