Local authentication and authorization
JITC requires that access to security logs be provided through security user authentication and authorization. For more information about JITC security authentication and authorization, see the Access Security Guide for your switch.