Reference Guide
• authentication-key — Enter an authentication in plain text (up to 42 characters). It is not necessary to
enter 0 before the key.
• key authentication-key — Enter a text string for the encryption key used to authenticate the switch
on the TACACS+ server (up to 42 characters).
Default Not congured
Command Mode CONFIGURATION
Usage Information The authentication key must match the key congured on the TACACS+ server. You cannot enter spaces in the
key. The show running-configuration output displays both unencrypted and encrypted keys in encrypted
format. Congure the global timeout allowed for authentication requests on TACACS+ servers by using the
tacacs-server timeout command. By default, OS10 times out an authentication attempt on a TACACS+
server after ve seconds. The
no version of this command removes a TACACS+ server conguration.
Example
OS10(config)# tacacs-server host 1.5.6.4 key secret1
Supported Releases 10.4.0E(R2) or later
tacacs-server timeout
Congures the global timeout used for authentication attempts on TACACS+ servers.
Syntax
tacacs-server timeout seconds
Parameters seconds — Enter the timeout period used to wait for an authentication response from a TACACS+ server (1 to
1000 seconds).
Default 5 seconds
Command Mode CONFIGURATION
Usage Information The no version of this command resets the TACACS+ server timeout to the default.
Example
OS10(config)# tacacs-server timeout 360
Supported Releases 10.4.0E(R2) or later
username password role
Creates an authentication entry based on a user name and password, and assigns a role to the user.
Syntax
username username password password role role
Parameters
• username username — Enter a text string (up to 32 alphanumeric characters; 1 character minimum).
• password password — Enter a text string (up to 32 alphanumeric characters; 9 characters minimum).
• role role — Enter a user role:
– sysadmin — Full access to all commands in the system, exclusive access to commands that manipulate
the le system, and access to the system shell. A system administrator can create user IDs and user roles.
– secadmin — Full access to conguration commands that set security policy and system access, such as
password strength, AAA authorization, and cryptographic keys. A security administrator can display security
information, such as cryptographic keys, login statistics, and log information.
– netadmin — Full access to conguration commands that manage trac owing through the switch,
such as routes, interfaces, and ACLs. A network administrator cannot access conguration commands for
security features or view security information.
540 System management