Authentication and Authorization through TACACS
For TACACS authentication and authorization, the user can access to security log by configuring the file located on TACACS server. For more information about JITC security authentication and authorization, see the Access Security Guide for your switch.