Local authentication and authorization

JITC requires that access to security logs be provided through security user authentication and authorization. For more information about JITC security authentication and authorization, see the Access Security Guide for your switch.