FortiAuthenticator
FortiAuthenticator provides access management and single sign on.
Sx11
Staff
Staff
Article Id 243331

 

Description

 

This article describes how to use FortiAuthenticator as a TACACS+ server for DELL EMC switches to perform remote user authorization.

FortiAuthenticator can perform central authentication as a TACACS+ Server and authorize remote users to perform only specific commands configured on DELL EMC Switches through Privilege-levels and Roles.

 

Scope

 

FortiAuthenticator, DEL EMC switch

 

Solution

 

Specific remote users on FortiAuthenticator can authenticate and run specific commands on the switch by matching the different privilege levels or roles configured in DELL EMC Switch.

 

The full configuration on DELL EMC Switch side is not covered in this article. For more information, consult DELL support and check the following guides:

- https://www.dell.com/support/manuals/de-de/networking-s5048f-on/s5048f-on-9.14.2.4-config/configurin...

- https://www.dell.com/support/manuals/de-de/dell-emc-smartfabric-os10/os10-sec-best-prac_rg/preface?g...

 

Step 1: Configuration on the Dell EMC switch

 

1) Before performing any further steps, enable aaa authorization on the switch and define the method for authorization:

 

# aaa authorization config-commands role sysadmin default group tacacs+

 

This means all configuration commands entered from a non-console session with the sysadmin user role are authorized using the configured TACACS+ servers.

 

2) Dell EMC supports two vendor-specific options for TACACS+ implementation:

 

1) 'shell:priv-lvl=x' (Privilege levels)

2) 'shell:role=myrole' (Roles)

 

The test performed in this article will use a system-defined role 'sysadmin' as specified in step 1.

User-Defined Roles can also be created and used in authorization methods for different purposes (for example, network operators or auditors).

 

Step 2: FortiAuthenticator Configuration

 

1) Create the TACACS+ Service

 

Service name required for Dell authentication/authorization service is "ppp"

 

a) Go to TACACS+ Service - > Authorization and select services in the top right.

Create a new service with the following configuration details:

- Name: <Provide any name>

- Service: ppp

- Default permission for attributes: Allow

 

b) Select the newly created service and select 'Add Attribute'

 

Define role attributes:

- Attribute: shell:roles

- Value: sysadmin (the role configured in the DELL EMC Switch with Super-user privileges)

- Restriction: Mandatory.

 

Define Privilege Level attributes:

- Attribute: shell:priv-lvl

- Value: 15 (this is the privilege level)

- Restriction: Mandatory.

 

Sx11_1-1674139439001.png

 

 

2) Create a TACACS+ Authorization rule.

 

Go to TACACS+ Service - > Authorization and select Rules on the Top Right.

- Select Default permission for both non-shell and shell commands as allow.

- In the non-shell services allow the 'DELL_EMC' service created previously

 

Sx11_2-1674139561248.png

 

3) Add the authorization Rule either to the Remote User or to the User group

 

a) Add the TACACS+ Authorization rule to a Remote user in User Management Section:

 

Sx11_3-1674139703036.png

 

b) Add the TACACS+ Authorization rule to a User Group in User Management Section:

 

Sx11_4-1674139786728.png

 

 

4) Users will also require a TACACS+ policy specified as below:

 

https://docs.fortinet.com/document/fortiauthenticator/6.2.0/administration-guide/863858/creating-pol...

 

5) Debugging:

 

To investigate TACACS+ debugs related to authorization, see the following links:

https://<FortiAuthenticator_IP>/debug/tac_plus

https://<FortiAuthenticator_IP>/debug/tac_author

 

Successful authorization will normally show the following debug logs:

 

Sx11_5-1674140446698.png

 

Failures are commonly caused by the service not being defined or by the VSA Attribute not being assigned to the user or group in FortiAuthenticator:

 

Sx11_1-1674140722825.png

 

Other documentation related to TACACS+ and FortiAuthenticator:

 

- https://docs.fortinet.com/document/fortiauthenticator/6.2.0/administration-guide/791531/tacacs-servi...

- https://community.fortinet.com/t5/FortiAuthenticator/Technical-Tip-FortiAuthenticator-Tacacs-trouble...

- https://community.fortinet.com/t5/FortiAuthenticator/Technical-Tip-FortiAuthenticator-as-TACACS-serv...

Contributors