< Home

Domain-based User Management

An NAS performs domain-based user management. A domain is a group of users and each user belongs to a domain. A user uses only AAA configuration information in the domain to which the user belongs.

As shown in Figure 1, the domain manages configuration information including the AAA scheme, server template, and authorization information in a unified manner.

Figure 1 AAA configuration information in a domain

Authorization information can be delivered by a server or configured in a domain. Whether a user obtains authorization information delivered by a server or in a domain depends on the authorization method configured in the authorization scheme. For details, see Figure 2.
  • If local authorization is used, the user obtains authorization information from the domain.
  • If server-based authorization is used, the user obtains authorization information from the server or domain. Authorization information configured in a domain has lower priority than that delivered by a server. If the two types of authorization information conflicts, authorization information delivered by the server takes effect. If no conflict occurs, the two types of authorization information take effect simultaneously. In this manner, you can increase authorization flexibly by means of domain management, regardless of the authorization attributes provided by the AAA server.
Figure 2 Two types of authorization information

Domain to Which a User Belongs

As shown in Figure 3, the domain to which a user belongs is determined by the user name for logging in to the NAS. If the user name does not contain the domain name or the domain name contained in the user name is not configured on the NAS, the NAS cannot determine the domain to which the user belongs. In this case, the NAS adds the user to the default domain based on the user type.

Figure 3 Determining domains based on user names

As shown in Table 1, AAA divides users into administrators and access users to provide more refined and differentiated authentication, authorization, and accounting services. An NAS has two global default domains, namely, the global default administrative domain default_admin and the global default common domain default. The two domains are used as the global default domains for administrators and access users, respectively. Default configurations in the two domains are different.

The accounting scheme default is bound to the two global default domains. Modifying the accounting scheme may affect configurations of the two domains.

The two global default domains cannot be deleted and can only be modified.

Table 1 Global default domain

User Type

User Access Mode

Global Default Domain

Default Configurations in the Global Default Domain
Authentication Scheme Accounting Scheme Authorization Scheme

Administrator

Is also called a login user and refers to the user who can log in to NAS through FTP, HTTP, SSH, Telnet, and the console port.

default_admin

default (local authentication)

default (non-accounting)

N/A

Access user

Includes NAC users (including 802.1X authenticated, MAC address authenticated, and Portal authenticated users).

default

radius (local authentication)

default (non-accounting)

N/A

The global default domain can be customized based on actual requirements. The customized global default domain can be the global default common domain and the global default management domain at the same time.

You can run the display aaa configuration command to check the current global default common domain and the global default management domain on the NAS. The command output is as follows:
<HUAWEI> display aaa configuration
  Domain Name Delimiter            : @
  Domainname parse direction       : Left to right
  Domainname location              : After-delimiter
  Administrator user default domain: default_admin    //Global default management domain
  Normal user default domain       : default    //Global default common domain

For some access modes, you can specify the domain to which a user belongs using the command provided in the corresponding authentication profile to meet requirements of the user authentication management policy. For example, you can configure a default domain and a forcible domain for NAC access users on the NAS based on the authentication profile and specify the user type (802.1X, MAC address, or Portal authenticated user), achieving flexible configuration. The forcible domain, default domain, and domain carried in the user name are listed in descending order of the priority.

Forcible domain with a specified authentication method in the authentication profile > Forcible domain in the authentication profile > Domain carried in the user name > Default domain with a specified authentication method in the authentication profile > Default domain in the authentication profile > Global default domain. Note that a forcible domain specified for MAC address authenticated users within a MAC address range has the highest priority and takes precedence over that configured in an authentication profile.

Format of User Names Sent by an NAS to the RADIUS Server

  • Only RADIUS authentication supports modification of the user-entered original user names.
  • You can change the user-entered original user name based on the RADIUS server template.

An NAS can determine whether a user name sent to the RADIUS server contains the domain name based on the RADIUS server requirements. By default, an NAS directly sends the user-entered original user name to the RADIUS server without changing it.

You can set the format of user names sent by an NAS to the RADIUS server using the commands in Table 2.

The following commands modify only the user name format in RADIUS packets sent to the RADIUS server and do not modify the user name format in EAP packets. During 802.1X authentication, the RADIUS server checks whether the user name carried in EAP packets is the same as that on the RADIUS server. Therefore, you cannot modify the original user name using the radius-server user-name domain-included or undo radius-server user-name domain-included command during 802.1X authentication; otherwise, authentication may fail.

Table 2 Setting the format of user names sent by an NAS to the RADIUS server

Command

User Name Format

User-entered User Name User Name Sent by an NAS to the RADIUS Server

radius-server user-name original

User-entered original user name (default configuration)

user-name@huawei.com user-name@huawei.com
user-name user-name

radius-server user-name domain-included

Domain name included

user-name@huawei.com user-name@huawei.com
user-name

user-name@default

Assume that users use the default domain default.

undo radius-server user-name domain-included

Domain name excluded

user-name@huawei.com user-name
user-name user-name

undo radius-server user-name domain-included except-eap

Domain name excluded

NOTE:
This command takes effect only for non-EAP authenticated users.
user-name@huawei.com user-name
user-name user-name
Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
Next topic >