login
- system login
- SDE
M10-Smart
M2
RS420
AresC640
User login
- system login aaa
- SDE
M10-Smart
M2
RS420
AresC640
AAA options
- system login aaa accounting <id>
- SDE
M10-Smart
M2
RS420
AresC640
Accounting list name
- Reference:
- system login aaa authentication <id>
- SDE
M10-Smart
M2
RS420
AresC640
Authentication list name
- Reference:
- system login banner
- SDE
M10-Smart
M2
RS420
AresC640
System login banners
- system login banner post-login <id>
- SDE
M10-Smart
M2
RS420
AresC640
- Values:
id –
Display a message after login
Example: “Welcome to OSDx!”
- system login banner pre-login <id>
- SDE
M10-Smart
M2
RS420
AresC640
- Values:
id –
Display a message before login
Example: “Warning: do not use this system without proper permissions.”
- system login idle-timeout <u32>
- SDE
M10-Smart
M2
RS420
AresC640
Timeout interval in seconds
- Values:
u32 – Disabled (infinite timeout timer) (0)
u32 – Seconds (1-65535)
- system login max-auth-tries <u32>
- SDE
M10-Smart
M2
RS420
AresC640
Maximum number of authentication attempts allowed per connection
- Values:
u32 – Number of attempts (1-65535)
- system login role <txt>
- SDE
M10-Smart
M2
RS420
AresC640
User role
- Values:
txt – Role name (1-32)
- Instances:
Multiple
- Required:
- system login role <txt> authentication
- SDE
M10-Smart
M2
RS420
AresC640
Authentication for role members
- system login role <txt> authentication public-key <id>
- SDE
M10-Smart
M2
RS420
AresC640
- Values:
id –
Public key attached to this role
The key-based authentication involves two files: a public key and a private key. The first one is used for encrypting communications with a client that presumably owns the private key. As the private key should be owned only by a group or an individual, communications are always secure and the identity of the peers is always known. This is the so-called asymmetric encryption.
- Instances:
Multiple
- system login role <txt> level <u32>
- SDE
M10-Smart
M2
RS420
AresC640
Role privilege level
- Values:
u32 – Privilege level (0-15)
- system login unlock-time <u32>
- SDE
M10-Smart
M2
RS420
AresC640
Time until an account that has hit the maximum number of athentication attemps is unlocked
- Values:
u32 – Time in seconds (0-65535)
- system login user <txt>
- SDE
M10-Smart
M2
RS420
AresC640
User account information
- Values:
txt – User name (1-32)
- Instances:
Multiple
- Required:
- system login user <txt> authentication
- SDE
M10-Smart
M2
RS420
AresC640
Authentication password
- Required:
- system login user <txt> authentication encrypted-password <txt>
- SDE
M10-Smart
M2
RS420
AresC640
- Values:
txt – Encrypted password for this user
- system login user <txt> authentication public-key <id>
- SDE
M10-Smart
M2
RS420
AresC640
- Values:
id –
Public key attached to this user
The key-based authentication involves two files: a public key and a private key. The first one is used for encrypting communications with a client that presumably owns the private key. As the private key should be owned only by a group or an individual, communications are always secure and the identity of the peers is always known. This is the so-called asymmetric encryption.
- Instances:
Multiple
- system login user <txt> role <id>
- SDE
M10-Smart
M2
RS420
AresC640
- Values:
id – User role