summaryrefslogtreecommitdiffstats
path: root/docs/docsite
diff options
context:
space:
mode:
authorDjebran Lezzoum <ldjebran@gmail.com>2024-10-02 15:50:17 +0200
committerjessicamack <jmack@redhat.com>2024-10-15 23:43:32 +0200
commite4c11561cc9b845974ba972aedc2825efc94e4ef (patch)
tree09f57ecaf7838cac14cb2914abd38b6c2cc53dcd /docs/docsite
parentRemove LDAP authentication (#15546) (diff)
downloadawx-e4c11561cc9b845974ba972aedc2825efc94e4ef.tar.xz
awx-e4c11561cc9b845974ba972aedc2825efc94e4ef.zip
Remove TACACS+ authentication (#15547)
Remove TACACS+ authentication from AWX. Co-authored-by: Hao Liu <44379968+TheRealHaoLiu@users.noreply.github.com>
Diffstat (limited to 'docs/docsite')
-rw-r--r--docs/docsite/rst/administration/configure_awx_authentication.rst2
-rw-r--r--docs/docsite/rst/administration/ent_auth.rst36
2 files changed, 0 insertions, 38 deletions
diff --git a/docs/docsite/rst/administration/configure_awx_authentication.rst b/docs/docsite/rst/administration/configure_awx_authentication.rst
index c56dfc5937..01e610273f 100644
--- a/docs/docsite/rst/administration/configure_awx_authentication.rst
+++ b/docs/docsite/rst/administration/configure_awx_authentication.rst
@@ -7,8 +7,6 @@ Through the AWX user interface, you can set up a simplified login through variou
- :ref:`ag_auth_azure`
- :ref:`ag_auth_github`
- :ref:`ag_auth_google_oauth2`
-- :ref:`ag_auth_radius`
-- :ref:`ag_auth_tacacs`
Different authentication types require you to enter different information. Be sure to include all the information as required.
diff --git a/docs/docsite/rst/administration/ent_auth.rst b/docs/docsite/rst/administration/ent_auth.rst
index 238893ecee..a31f4d1cad 100644
--- a/docs/docsite/rst/administration/ent_auth.rst
+++ b/docs/docsite/rst/administration/ent_auth.rst
@@ -13,8 +13,6 @@ This section describes setting up authentication for the following enterprise sy
.. contents::
:local:
-Azure, RADIUS, and TACACS+ users are categorized as 'Enterprise' users. The following rules apply to Enterprise users:
-
- Enterprise users can only be created via the first successful login attempt from remote authentication backend.
- Enterprise users cannot be created/authenticated if non-enterprise users with the same name has already been created in AWX.
- AWX passwords of enterprise users should always be empty and cannot be set by any user if there are enterprise backend-enabled.
@@ -78,37 +76,3 @@ AWX can be configured to centrally use RADIUS as a source for authentication inf
4. Enter the port and secret information in the next two fields.
5. Click **Save** when done.
-
-
-.. _ag_auth_tacacs:
-
-TACACS+ settings
------------------
-
-.. index::
- pair: authentication; TACACS+ Authentication Settings
-
-
-Terminal Access Controller Access-Control System Plus (TACACS+) is a protocol that handles remote authentication and related services for networked access control through a centralized server. In particular, TACACS+ provides authentication, authorization and accounting (AAA) services, in which you can configure AWX to use as a source for authentication.
-
-.. note::
-
- This feature is deprecated and will be removed in a future release.
-
-1. Click **Settings** from the left navigation bar.
-
-2. On the left side of the Settings window, click **TACACs+ settings** from the list of Authentication options.
-
-3. Click **Edit** and enter information in the following fields:
-
-- **TACACS+ Server**: Provide the hostname or IP address of the TACACS+ server with which to authenticate. If this field is left blank, TACACS+ authentication is disabled.
-- **TACACS+ Port**: TACACS+ uses port 49 by default, which is already pre-populated.
-- **TACACS+ Secret**: Secret key for TACACS+ authentication server.
-- **TACACS+ Auth Session Timeout**: Session timeout value in seconds. The default is 5 seconds.
-- **TACACS+ Authentication Protocol**: The protocol used by TACACS+ client. Options are **ascii** or **pap**.
-
-.. image:: ../common/images/configure-awx-auth-tacacs.png
- :alt: TACACS+ configuration details in AWX settings.
-
-4. Click **Save** when done.
-