<div dir="ltr">I have an example of how to do that with do_auth on taca.... ah #*@&. Never mind. <div><br></div><div>Without control of the TACACS server, you're limited to changing the password. I wonder if Pam can authenticate Tacacs? If your org is so bass ackward they won't let you make a static read only account, you could set up your OWN tacacs server, and redirect all accounts but one to authenticate Pam set to query the other tacacs server. (I also work Gov) </div></div><div class="gmail_extra"><br><div class="gmail_quote">On Tue, Jan 27, 2015 at 12:57 PM, heasley <span dir="ltr"><<a href="mailto:heas@shrubbery.net" target="_blank">heas@shrubbery.net</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Tue, Jan 27, 2015 at 09:22:13PM +0200, Alan McKinnon:<br>
<span class="">> Have the tacacs admins create a single tacacs user "rancid" with very<br>
> restricted permissions. You can look in the various *rancid scripts for<br>
> @commandtable which lists the exact commands used - permit those and<br>
> deny everything else. Enter the creds for this rancid user in<br>
> ~rancid/.cloginrc<br>
<br>
</span>most of the scripts can give you a list with the -C option. eg:<br>
% rancid -t cisco -C foo<br>
clogin -t 90 -c 'show version;show redundancy secondary;show idprom backplane;show install active;show env all;show rsp chassis-info;show gsr chassis;show diag chassis-info;show boot;show bootvar;show variables boot;show flash;dir /all nvram:;dir /all bootflash:;dir /all slot0:;dir /all disk0:;dir /all slot1:;dir /all disk1:;dir /all slot2:;dir /all disk2:;dir /all harddisk:;dir /all harddiska:;dir /all harddiskb:;dir /all sup-bootdisk:;dir /all sup-bootflash:;dir /all sup-microcode:;dir /all slavenvram:;dir /all slavebootflash:;dir /all slaveslot0:;dir /all slavedisk0:;dir /all slaveslot1:;dir /all slavedisk1:;dir /all slaveslot2:;dir /all slavedisk2:;dir /all slavesup-bootflash:;dir /all sec-nvram:;dir /all sec-bootflash:;dir /all sec-slot0:;dir /all sec-disk0:;dir /all sec-slot1:;dir /all sec-disk1:;dir /all sec-slot2:;dir /all sec-disk2:;show controllers;show controllers cbus;show diagbus;show diag;show capture;show module;show spe version;show c7200;show inventory raw;show vtp s<br>
tatus;show vlan;show vlan-switch;show switch detail;show sdm prefer;show system mtu;show debug;show shun;more system:running-config;show running-config view full;show running-config;write term' foo<br>
% fnrancid -C foo<br>
fnlogin -t 90 -c'get system status;show full-configuration' foo<br>
<br>
also see etc/rancid.types.base<br>
<div class="HOEnZb"><div class="h5">_______________________________________________<br>
Rancid-discuss mailing list<br>
<a href="mailto:Rancid-discuss@shrubbery.net">Rancid-discuss@shrubbery.net</a><br>
<a href="http://www.shrubbery.net/mailman/listinfo/rancid-discuss" target="_blank">http://www.shrubbery.net/mailman/listinfo/rancid-discuss</a><br>
</div></div></blockquote></div><br></div>
<pre>
E-Mail to and from me, in connection with the transaction
of public business, is subject to the Wyoming Public Records
Act and may be disclosed to third parties.