mirror of
https://github.com/ansible/awx.git
synced 2026-02-15 18:20:00 -03:30
Remove TACACS+ authentication (#15547)
Remove TACACS+ authentication from AWX. Co-authored-by: Hao Liu <44379968+TheRealHaoLiu@users.noreply.github.com>
This commit is contained in:
committed by
jessicamack
parent
f22b192fb4
commit
e4c11561cc
@@ -7,8 +7,6 @@ Through the AWX user interface, you can set up a simplified login through variou
|
||||
- :ref:`ag_auth_azure`
|
||||
- :ref:`ag_auth_github`
|
||||
- :ref:`ag_auth_google_oauth2`
|
||||
- :ref:`ag_auth_radius`
|
||||
- :ref:`ag_auth_tacacs`
|
||||
|
||||
Different authentication types require you to enter different information. Be sure to include all the information as required.
|
||||
|
||||
|
||||
@@ -13,8 +13,6 @@ This section describes setting up authentication for the following enterprise sy
|
||||
.. contents::
|
||||
:local:
|
||||
|
||||
Azure, RADIUS, and TACACS+ users are categorized as 'Enterprise' users. The following rules apply to Enterprise users:
|
||||
|
||||
- Enterprise users can only be created via the first successful login attempt from remote authentication backend.
|
||||
- Enterprise users cannot be created/authenticated if non-enterprise users with the same name has already been created in AWX.
|
||||
- AWX passwords of enterprise users should always be empty and cannot be set by any user if there are enterprise backend-enabled.
|
||||
@@ -78,37 +76,3 @@ AWX can be configured to centrally use RADIUS as a source for authentication inf
|
||||
4. Enter the port and secret information in the next two fields.
|
||||
|
||||
5. Click **Save** when done.
|
||||
|
||||
|
||||
.. _ag_auth_tacacs:
|
||||
|
||||
TACACS+ settings
|
||||
-----------------
|
||||
|
||||
.. index::
|
||||
pair: authentication; TACACS+ Authentication Settings
|
||||
|
||||
|
||||
Terminal Access Controller Access-Control System Plus (TACACS+) is a protocol that handles remote authentication and related services for networked access control through a centralized server. In particular, TACACS+ provides authentication, authorization and accounting (AAA) services, in which you can configure AWX to use as a source for authentication.
|
||||
|
||||
.. note::
|
||||
|
||||
This feature is deprecated and will be removed in a future release.
|
||||
|
||||
1. Click **Settings** from the left navigation bar.
|
||||
|
||||
2. On the left side of the Settings window, click **TACACs+ settings** from the list of Authentication options.
|
||||
|
||||
3. Click **Edit** and enter information in the following fields:
|
||||
|
||||
- **TACACS+ Server**: Provide the hostname or IP address of the TACACS+ server with which to authenticate. If this field is left blank, TACACS+ authentication is disabled.
|
||||
- **TACACS+ Port**: TACACS+ uses port 49 by default, which is already pre-populated.
|
||||
- **TACACS+ Secret**: Secret key for TACACS+ authentication server.
|
||||
- **TACACS+ Auth Session Timeout**: Session timeout value in seconds. The default is 5 seconds.
|
||||
- **TACACS+ Authentication Protocol**: The protocol used by TACACS+ client. Options are **ascii** or **pap**.
|
||||
|
||||
.. image:: ../common/images/configure-awx-auth-tacacs.png
|
||||
:alt: TACACS+ configuration details in AWX settings.
|
||||
|
||||
4. Click **Save** when done.
|
||||
|
||||
|
||||
Reference in New Issue
Block a user