Penguin
Annotated edit history of TACACS version 4, including all changes. View license author blame.
Rev Author # Line
4 AristotlePagaltzis 1 [Acronym] for __T__erminal __A__ccess __C__ontroller __A__ccess __C__ontrol __S__ystem.
1 CraigBox 2
3 [Cisco]'s protocol for allowing a NetworkAccessServer (or more commonly, a number of them) to offload user administration to a central server.
4
5 Described in RFC:1492.
6
7 You probably won't see this much outside of [Cisco] gear. Compare [RADIUS].
2 CiscoMcNaught 8
3 AristotlePagaltzis 9 !! Linux Alternative: [XTacacs | http://www.rc.unesp.br/polo/tacacs/]
2 CiscoMcNaught 10
3 AristotlePagaltzis 11 __xtacacsd__ is an extended [TACACS] server (for [Cisco] network devices) which authenticates users logging onto a terminal server (or any host which cares to query the server). It uses the standard password file (__/etc/passwd__) by default, or an alternate list of password files.
2 CiscoMcNaught 12
3 AristotlePagaltzis 13 This program can be used to authenticate users when they try to access a terminal server ([Cisco] terminal servers support this option). The server can log information about all queries coming to the server using syslog(2). It is meant to be invoked by inetd(8) but can be run from a terminal in standalone mode if desired. In this mode, it writes all errors to the controlling terminal. It the __-d__ option is specified on the command line (along with __-s__), it will not fork so all debug messages and errors will be printed on the stderr.
2 CiscoMcNaught 14
3 AristotlePagaltzis 15 The server expects a username and password to be supplied in the query packet recieved from the terminal servers. This username and password are authenticated by searching in the password file(s). (The default is __/etc/passwd__ but up to five alternate filenames can be specified). If it cannot find a match in any of the password files, it sends an authentication failure reply to the query (unless the quiet option is specified in which case no negative response will be sent).
2 CiscoMcNaught 16
3 AristotlePagaltzis 17 The server always returns an authentication failure for any queries that have a uid of 0 (the SuperUser) or for any users that do not have a password (null password field) in the password files. It also verifies that the account is current and not expired if the last password field (__pw_shell__) supports this feature (or if the password file has an expiry field on System V based machines). Finally, permissions are checked for the request by matching the username, group-id and gecos field of the user in the [TACACS] request (the groups listed in the __/etc/groups__ file are checked as well).