On Wed, Feb 18, 2026 at 2:10 AM Saku Ytti <[email protected]> wrote:
>
> On Wed, 18 Feb 2026 at 08:34, Christopher Morrow via NANOG
> <[email protected]> wrote:
>
> > 100% yes, I guess my question sort of is, in the year 2026, if you have:
> >   *  automated updates to devices
> >   *  ssh key support in your fleet
> >   * ability to enumerate the users / devices mapping necessary for
> > your operations
> >
> > would not using tac+ make more sense now?
>
> We can definitely expand on this. We can also ask, why have >1 account
> to devices.
>
> You can implement GUI, TUI or CLI access to a proxy code, which
> implements device specific commands and returns output from a given
> remote host. You can normalise experience regardless of platform or
> even enrich output from other systems potentially expediting
> debugging, but humans never interact directly with devices. You can
> have normalised logging and authentication on the proxy code. As the
> actual channel to remove can be SSH, netconf or telnet which can be
> always on, you can return output much faster using this approach, as
> you don't have to pay connect/auth tax. You can easily emulate legacy
> access via this code too, and expose the device under various loopback
> addresses which map to external devices, so legacy code can interact
> with it, as if it is a direct connection.

yes, I agree with almost all of the above, but I'd say there MAY still be need
of more than 1 account. you MIGHT have something akin to:
  * RO user for human things that just NEVER need RW access
  * RW user with restrictions via the proxy system proposed
  * automaton accounts specific to the needs of those automatons
    - rancid user
    - device interface data scraper
    - provisioning robot
  * some fallback user/password which you'd already have deployed/etc
    - because sometimes that device is not actually connected to the network!!

Moving the humans back to some proxy-based answer gets you back to a 'single
point' to lock people out when the mythical Foo leaves the
environment. An actual
goal is to remove huamns from network device access

> But the problem with the above is that someone needs to write and
> maintain the code. But at least you control the code, and feature
> velocity on it. So if you can spare the development hour, adding this
> middle layer can help immensely.

Yep! this is sort of a problem. There are lots of folks that can/don't
have the time
to build a thing like this... I don't think it's QUITE an hour's work
:) but there's
plenty of parts in place already to help you along the journey
(perhaps this is Saku's
point, though).

> Problem with your quoted approach is that while you say thousands of
> users are fine on some devices, you also gave an example where it is a

I said you CAN do it I don't recommend it...(or that was my intent anyway)
Somewhere between 'zero humans have acccess (except in emergency)'
and 'we permit all humans unfettered wild-persona status!' is an answer
for folks, I bet.

The proxy answer you propose above is great (I think), but does bring with it
some level of ongoing support by your org. That may be fine if you employ
a slew of software types...

I think my aim(after some questions) was to point out that:
   * "there are lots of ansible playbook versions of network management"
  * you CAN achieve a bunch of of the goal I was getting to with that path
  * you COULD extend to your answer if you have the skillset in house
  * a caution about adding a boatload of users to a NOS config
    (I really didn't mean that off handed comment set to mean that it
    was 'ok' to go adding a boatload of users, yea don't do that! :) )

> problem. Which is an excellent reason not to do this, generally don't
> do anything strange on NOS, unless you absolutely must. You really
> don't want to be the customer that pushes the envelope with vendors to
> support larger numbers of users, or whatever it may be. You assert
> almost no control on the feature velocity.

agreed, most folk PROBABLY can just go the ansible playbook / ssh-keys
route... without a ton of work or headache.

> On the opposite end, you know that TACACS is not a strange thing,
> everyone else is working with the vendor too, when there are issues on
> it. If you want boring outcomes, do boring things.

yes, it took a while (and not all network vendors actually support
tac+ still) for
the majority of vendors to support tac+. If you don't get too far astray from
the core option.

>   ++ytti

thanks! :)
_______________________________________________
NANOG mailing list 
https://lists.nanog.org/archives/list/[email protected]/message/2JJX7QCQHFXK6RV7K47BIJGSJMCAYDGC/

Reply via email to