You can configure TACACS+ authentication
for end users and firewall or Panorama administrators. You can also
use a TACACS+ server to manage administrator authorization (role
and access domain assignments) by defining Vendor-Specific Attributes (VSAs). For
all users, you must configure a TACACS+
server profile that defines how the firewall or Panorama
connects to the server. You then assign the server
profile to an authentication profile for each set of users
who require common authentication settings. What you do with the
authentication profile depends on which users the TACACS+ server authenticates:
End users
—Assign the authentication profile to an
authentication enforcement object and assign the object to Authentication
policy rules. For the full procedure, see Configure Authentication Policy.
Administrative accounts with authorization managed locally
on the firewall or Panorama
The profile defines how the firewall connects to the TACACS+
server.
Select
Device
Server Profiles
TACACS+
or
Panorama
Server Profiles
TACAS+
on Panorama™ and
Add
a
profile.
Enter a
Profile Name
to identify
the server profile.
(
Optional
) Select
Administrator
Use Only
to restrict access to administrators.
Enter a
Timeout
interval in
seconds after which an authentication request times out (default
is 3; range is 1–20).
Select the
Authentication Protocol
(default
is
CHAP
) that the firewall uses to authenticate
to the TACACS+ server.
Select
CHAP
if
the TACACS+ server supports that protocol; it is more secure than
PAP
.
Add
each TACACS+ server and
enter the following:
Name
to identify the server
TACACS+ Server
IP address or FQDN.
If you use an FQDN address object to identify the server and you
subsequently change the address, you must commit the change for
the new server address to take effect.
Secret
/
Confirm Secret
(a
key to encrypt usernames and passwords)
Server
Port
for authentication requests
(default is 49)
Click
OK
to save the server
profile.
Assign
the TACACS+ server profile to an authentication profile.
The authentication profile defines authentication settings
that are common to a set of users.
Select
Device
Authentication Profile
and
Add
a
profile.
Enter a
Name
to identify the
profile.
Set the
Type
to
TACACS+
.
Select the
Server Profile
you
configured.
Select
Retrieve user group from TACACS+
to
collect user group information from VSAs defined on the TACACS+
server.
The firewall matches the group information against the
groups you specify in the Allow List of the authentication profile.
Select
Advanced
and, in the
Allow List,
Add
the users and groups that
are allowed to authenticate with this authentication profile.
Click
OK
to save the authentication
profile.
Configure the firewall to use the authentication profile
for all administrators.
Select
Device
Setup
Management
and
edit the Authentication Settings.
Select the
Authentication Profile
you
configured and click
OK
.
Configure the roles and access domains that define authorization
settings for administrators.
If you already defined TACACS+ VSAs
on the TACACS+ server, the names you specify for roles and access domains
on the firewall must match the VSA values.