1.5.6 Login Privilege Elevation for Administrators

Information

By default, the AOS-CX switches only allow the administrator user to perform the "enable" command and when executed, the user is elevated in privilege without prompting for a password. To increase the security, login privilege elevation feature can be enabled. Configuration provided to enable/disable the privilege-elevation feature & will be disabled by default. The customer will have to enable this feature & then re-login for the privilege-elevation feature to take effect..Upon successful login into the switch, the administrator user will be first provided with lower privilege access (the operator level access '>' prompt) and upon executing the 'enable' command, will be prompted to enter a password. The user will have to enter the same password and will be re-authenticated to elevate the privilege to administrator (the administrator level access with '#' prompt). Executing a disable will bring back the access to the '>' prompt

- Supported for Local/Radius/TACACS+ login authentications.
- Applicable to only users in administrator group and same password for both levels.

Every time a user runs the "enable" CLI, highly secure environments advise demanding a password.

Solution

To enable login privilege-elevation for group administrators -

Switch(config)# aaa authentication login privilege-elevation group administrators

Impact:

The impact of this feature enhances security and operational efficiency by ensuring that only trusted users gain administrative access after executing "enable" CLI.

See Also

https://workbench.cisecurity.org/benchmarks/24202