Authentication and Authorization through TACACS

For TACACS authentication and authorization, the user can access to security log by configuring the file located on TACACS server. For more information about JITC security authentication and authorization, see the Access Security Guide for your switch.