f. Select thec lientcerti ficate.
g. ClickApply.
In the CLI
ssh mgmt-auth public-key [username/password]
mgmt-user ssh-pubkey client-cert <certificate> <username> <role>
Enabling RADIUS Serv er Authentication
This section include many different types of RADIUS s erverconfiguration and related procedures.

Configuring RADIUS S erver Username a nd Password A uthentication

In this example, an externalRAD IUS server is used to authenticate management users. Upon authentication, users
are assignedt hedefault role root.
In the WebUI
1. Navigate to the Configuration > Security > A uthentication > Servers page.
2. Select RADIUS Server to display the Radius Server List.
a. To configure a RADIUS server, enter the name for the server(for example, rad1) and clickA dd.
b. Select the name to configureserver parameters, such as IP address. Select the Modecheckbox to activatet he
server.
c. Click Apply.
3. Select Server Group to display t he ServerGroup list.
a. Enter the name of the new server group (for example, corp_rad) and click Add.
b. Select the name to configurethe server group.
c. Under Servers, click New to add a serverto the group.
d. Select a server from the drop-downmenu and click Add Server.
e. Click Apply.
4. Navigate to the Configuration > Management >Administr ation page.
a. Under Management Authentication Servers, select a managementrole (for example, root) for the Default
Role.
b. Select (check) Mode.
c. For Server Group, select the server groupt hat you just configured.
d. Click Apply.
In the CLI
aaa authentication-server radius rad1
host <ipaddr>
enable
aaa server-group corp_rad
auth-server rad1
aaa authentication mgmt
default-role root
enable
server-group corp_rad
DellPowerConnect W- Series ArubaOS 6.2 | User Guide ManagementAccess | 627