Fujitsu BX600 Server User Manual


 
Security Commands Command Reference
Intelligent Blade Panel Module
232
list of methods are set in the authentication login list. If the authentication login list does not
exist, a new authentication login list is first created and then the authentication methods are set
in the authentication login list. The maximum number of authentication login methods is three.
The possible method values are local, radius, reject, and tacacs.
The value of local indicates that the user’s locally stored ID and password are used for
authentication. The value of radius indicates that the user’s ID and password will be
authenticated using the RADIUS server. The value of reject indicates that the user is never
authenticated. The value of tacacs indicates that the user’s ID and password will be
authenticated using the TACACS.
To authenticate a user, the authentication methods in the user’s login will be attempted in order
until an authentication attempt succeeds or fails.
Note that the default login list included with the default configuration cannot be changed.
Syntax
authentication login <listname> [<method1>] [<method2>] [<method3>]
no authentication login <listname>
<listname> - creates an authentication login list (Range: up to 15 characters).
<method1 - 3> - The possible method values are local, radius, reject, and tacacs.
no - This command deletes the specified authentication login list. The attempt to delete
will fail if any of the following conditions are true:
1. The login list name is invalid or does not match an existing authentication login list
2. The specified authentication login list is assigned to any user or to the nonconfigured
user for any component.
3. The login list is the default login list included with the default configuration and was
not created using ‘config authentication login create’. The default login list cannot be
deleted.
Default Setting
None
Command Mode
Global Config
7.9.2.2 username defaultlogin
This command assigns the authentication login list to use for non-configured users when
attempting to log in to the system. This setting is overridden by the authentication login list
assigned to a specific user if the user is configured locally. If this value is not configured, users
will be authenticated using local authentication only.