From 7183d786563547bf5cb2852663608c0a437aa6b7 Mon Sep 17 00:00:00 2001 From: Christian Poessinger Date: Tue, 25 Feb 2020 16:36:21 +0100 Subject: user-management: radius: document possibility to disable individual server --- docs/system/user-management.rst | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) (limited to 'docs/system') diff --git a/docs/system/user-management.rst b/docs/system/user-management.rst index e1828a3d..d3dcc378 100644 --- a/docs/system/user-management.rst +++ b/docs/system/user-management.rst @@ -122,10 +122,9 @@ Configuration Setup the `` in seconds when querying the RADIUS server. -.. hint:: If you want to have admin users to authenticate via RADIUS it is - essential to sent the ``Cisco-AV-Pair shell:priv-lvl=15`` attribute. Without - the attribute you will only get regular, non privilegued, system users. +.. cfgcmd:: set system login radius server
disable + Temporary disable this RADIUS server. It won't be queried. .. cfgcmd:: set system login radius source-address
@@ -136,6 +135,11 @@ Configuration it error prone on e.g. OSPF networks when a link fails and a backup route is taken. +.. hint:: If you want to have admin users to authenticate via RADIUS it is + essential to sent the ``Cisco-AV-Pair shell:priv-lvl=15`` attribute. Without + the attribute you will only get regular, non privilegued, system users. + + Login Banner ============ -- cgit v1.2.3