How to configure RADIUS profiles to segment user permissions in Cisco devices for RSA Authentication Manager 8.x
Originally Published: 2016-09-05
Article Number
Applies To
RSA Product Set: SecurID
RSA Product/Service Type: Authentication Manager
RSA Version/Condition: 8.x
Issue
- Customer network devices are getting authenticated through RSA Authentication Manager using an Active Directory account.
- Currently these users have full access to the network devices.
- The requirement is to grant Read-Write access for administrative users while Read-Only access for other users, the Service Desk for example.
Resolution
- Create the RSA RADIUS client for a Cisco network device. In the Security Console.
- Click RADIUS > RADIUS Clients > Add New.
- Important: For the Make/Model option select Cisco IOS 11.1 or later.
- Complete the form and click Save with associated agent. .
- Click Save.
- In the Security Console, click RADIUS > RADIUS Profiles > Add New.
- Create a RADIUS profile, selecting the Return List attribute of Cisco-AVPAIR then configure the value with shell:priv-lvl=<integer between 1 to 15>. The administrative attribute for Read-Write should be either
- The av-pair, that is shell:priv-lvl=15
or
- The attribute for read-only can be the av-pair shell:priv-lvl=1
Note that the priv-lvl value ranges from 1 to 15 depending on your router enable privilege config.
The 15 represents full admin access into the Cisco device and the lower values represent a lesser privilege than 15/full admin access.
- In the Security Console, click RADIUS > RADIUS Profiles > Manage Existing and select the profile from the context menu.
- Select Associated Users.
- Click Assign to More.
- Search for the users to link to this profile and select them.
- Click Assign Profile.
- Verify authentication with the user ID.
Related Articles
Cisco ASA - RSASecurID Access Implementation Guide 186Number of Views Radius Client Authentication failed For PIN+Token profile (New PIN Mode) with Cisco Anyconnect VPN 116Number of Views Authentication fails to RSA Authentication Manager 8.x with Cisco Adaptive Security Appliance 9.8 (2) using native SecurID… 134Number of Views Assign an Agent to a RADIUS Profile 6Number of Views RADIUSwith AM Configuration - Cisco FTD RSA Ready SecurID Access Implementation Guide 90Number of Views
Trending Articles
RSA announces the availability of the RSA SecurID Hardware Appliance 230 based on the Dell PowerEdge R240 Server RSA Authentication Manager 8.9 Release Notes (January 2026) RSA-2026-07: RSA Identity Router Security Update for Third-Party Component Vulnerabilities How to troubleshoot Oracle database ORA-04030 errors in RSA Identity Governance & Lifecycle RSA Authentication Manager Upgrade Process
Don't see what you're looking for?