Usage Scenario
After you use the authentication-scheme command to associate a domain with a certain authentication scheme, the system can use this authentication scheme for user authentication.
Before using the authentication-scheme command, ensure that an authentication scheme has been created.
Precautions
If the HWTACACS server is Down, unreachable, or does not respond in time, the command authorization fails, and no user can execute such command.
Command-line-based authorization is not associated with any authorization mode.
To configure command-line-based authorization for users at levels 3 to 15, set privilege-level to 3 in the authorization-cmd command for all such users if the command-privilege level rearrange command is not run in the system view, but set privilege-level to the specific level at which target users reside if the command-privilege level rearrange command is run in the system view. For example, to configure hwtacacs authorization for users at level 4, run the authorization-cmd 3 hwtacacs command if the command-privilege level rearrange command is not run, but run the authorization-cmd 4 hwtacacs command if the command-privilege level rearrange command is run.