Authentication and Authorization through RADIUS

For RADIUS authentication and authorization, the security user will be able to access to security log by configuring the file located on RADIUS server. For more information about JITC authentication and authorization through RADIUS, see the Access Security Guide for your switch.