You can clearly see the process of authorization using the same network example from earlier in the chapter. Figure 1-2 demonstrates a basic authorization process that can take place, in addition to the authentication process that is seen in the previous example. One difference you might note here is that in the authentication example, only a local authentication is discussed. In this authorization example, an AAA server is added, which includes authorizations. More detail on local authentication versus authentication using a server will be discussed in Chapter 3. Figure 1-2. Basic Authorization of FTPIn this situation, the following steps take place:
Again, the method list that is configured determines what authorization is to be performed. The configuration of a method list is discussed in Chapter 3; however, you might want to note that the configuration of a method list for authorization is the same as the method list configuration for authentication as well as accounting. |