summaryrefslogtreecommitdiffstats
path: root/docs/docsite/rst/administration/ent_auth.rst
diff options
context:
space:
mode:
Diffstat (limited to 'docs/docsite/rst/administration/ent_auth.rst')
-rw-r--r--docs/docsite/rst/administration/ent_auth.rst36
1 files changed, 0 insertions, 36 deletions
diff --git a/docs/docsite/rst/administration/ent_auth.rst b/docs/docsite/rst/administration/ent_auth.rst
index 238893ecee..a31f4d1cad 100644
--- a/docs/docsite/rst/administration/ent_auth.rst
+++ b/docs/docsite/rst/administration/ent_auth.rst
@@ -13,8 +13,6 @@ This section describes setting up authentication for the following enterprise sy
.. contents::
:local:
-Azure, RADIUS, and TACACS+ users are categorized as 'Enterprise' users. The following rules apply to Enterprise users:
-
- Enterprise users can only be created via the first successful login attempt from remote authentication backend.
- Enterprise users cannot be created/authenticated if non-enterprise users with the same name has already been created in AWX.
- AWX passwords of enterprise users should always be empty and cannot be set by any user if there are enterprise backend-enabled.
@@ -78,37 +76,3 @@ AWX can be configured to centrally use RADIUS as a source for authentication inf
4. Enter the port and secret information in the next two fields.
5. Click **Save** when done.
-
-
-.. _ag_auth_tacacs:
-
-TACACS+ settings
------------------
-
-.. index::
- pair: authentication; TACACS+ Authentication Settings
-
-
-Terminal Access Controller Access-Control System Plus (TACACS+) is a protocol that handles remote authentication and related services for networked access control through a centralized server. In particular, TACACS+ provides authentication, authorization and accounting (AAA) services, in which you can configure AWX to use as a source for authentication.
-
-.. note::
-
- This feature is deprecated and will be removed in a future release.
-
-1. Click **Settings** from the left navigation bar.
-
-2. On the left side of the Settings window, click **TACACs+ settings** from the list of Authentication options.
-
-3. Click **Edit** and enter information in the following fields:
-
-- **TACACS+ Server**: Provide the hostname or IP address of the TACACS+ server with which to authenticate. If this field is left blank, TACACS+ authentication is disabled.
-- **TACACS+ Port**: TACACS+ uses port 49 by default, which is already pre-populated.
-- **TACACS+ Secret**: Secret key for TACACS+ authentication server.
-- **TACACS+ Auth Session Timeout**: Session timeout value in seconds. The default is 5 seconds.
-- **TACACS+ Authentication Protocol**: The protocol used by TACACS+ client. Options are **ascii** or **pap**.
-
-.. image:: ../common/images/configure-awx-auth-tacacs.png
- :alt: TACACS+ configuration details in AWX settings.
-
-4. Click **Save** when done.
-