On 06/21/2011 08:49 PM, David Heinz wrote:

> I've recently added some Juniper routers into the network that are 
> authenticating against a legacy freeware tacacs server. I'm moving to the 
> Radiator format but am not sure how to convert the configuration to an 
> "AuthorizeGroup"... Below is the example config I'm wanting to convert.
> 
> service = arbor {
>    arbor_group = arbor_user
> }
> service = exec {
>    priv-lvl = 15
> }
> service = junos-exec {
>    local-user-name = noc-user
>    allow-commands = "configure private|clear interface"
>    allow-configuration = "routing-options static route .* next-hop ds.*"
>    deny-commands = "configure|ssh*|test*|request*|file*|mtrace*"
> }
> 
> Would this look something like??

The syntax looks correct, but you should do testing to see what Radiator
actually receives.

Also, have you noticed goodies/tacacsplustest? Using your configure as
an example (note: mail client wraps long lines):

% perl goodies/tacacsplustest -trace 4 -port 4949 -noacct \
  -author_args service=junos-exec,cmd'*'

Connecting to TACACS+ server localhost:4949
sending Authentication request...
authentication response: 193, 1, 2, 0, 1234, 1, 0, ,
Disconnect from localhost:4949
OK
sending Authorization request...

authorization response: 192, 2, 2, 0, 1234, 1, , ,
local-user-name=noc-user allow-commands=configure private|clear
interface allow-configuration=routing-options static route .* next-hop
ds.* deny-commands=configure|ssh*|test*|request*|file*|mtrace*

Disconnect from localhost:4949
OK


tacacsplustest can be very useful for testing the configuration.

> AuthorizeGroup ADMINTEST permit service=shell cmd\* {priv-lvl=15 idletime=45 
> timeout=600}
> AuthorizeGroup ADMINTEST permit service=arbor cmd\* {arbor_group=arbor_user}
> AuthorizeGroup ADMINTEST permit service=junos-exec cmd\* 
> {local-user-name=noc-user allow-commands="configure private|clear interface" \
>      allow-configuration="routing-options static route .* next-hop ds.*" 
> deny-commands="configure|ssh*|test*|request*|file*|mtrace*"}
> AuthorizeGroup ADMINTEST permit .*
> 
> I wasn't sure if I needed a new "service=junos-exec" or if those commands 
> could just go under the normal "service=shell cmd\*" section.

I would not move the commands if JunOS uses junos-exec as service name
instead of shell. Note that permit .* as the last action and pattern can
easily grant too much access if the matching rules are incorrect.


-- 
Heikki Vatiainen <[email protected]>

Radiator: the most portable, flexible and configurable RADIUS server
anywhere. SQL, proxy, DBM, files, LDAP, NIS+, password, NT, Emerald,
Platypus, Freeside, TACACS+, PAM, external, Active Directory, EAP, TLS,
TTLS, PEAP, TNC, WiMAX, RSA, Vasco, Yubikey, MOTP, HOTP, TOTP,
DIAMETER etc. Full source on Unix, Windows, MacOSX, Solaris, VMS,
NetWare etc.
_______________________________________________
radiator mailing list
[email protected]
http://www.open.com.au/mailman/listinfo/radiator

Reply via email to