0% found this document useful (0 votes)
93 views2 pages

Network Devices - Cyberark Flow

This document discusses using Tacacs for authentication and authorization of users logging into routers. When a user logs into a router via SSH and provides their username and password, the router checks this information with the Tacacs server. The Tacacs server then handles authentication and authorization for that user. After the user session is complete, the router sends log information about the session to the Tacacs server.

Uploaded by

Orian Andrealdy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
93 views2 pages

Network Devices - Cyberark Flow

This document discusses using Tacacs for authentication and authorization of users logging into routers. When a user logs into a router via SSH and provides their username and password, the router checks this information with the Tacacs server. The Tacacs server then handles authentication and authorization for that user. After the user session is complete, the router sends log information about the session to the Tacacs server.

Uploaded by

Orian Andrealdy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Using Tacacs

2. Router check username password to Tacacs

3. Tacacs will inform authentication and authorization for user

Router sent text log to Tacacs


1. SSH After finish session
Input username & Password
ISOLATE – Privileged SESSION MANAGEMENT
PVWA
HTTP/S TCP 1858

SysAdmin

Upon completion, recording is uploaded


back to the Vault

TCP 1858

PSM

During the session all activity is


recorded on the file system of the
PSM server.

Check local
authentication
in devices

You might also like