Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
TACACS
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==History== TACACS was originally developed in 1984 by BBN, later known as [[BBN Technologies]], for administration of ARPANET and MILNET, which ran unclassified network traffic for [[DARPA]] at the time and would later evolve into the [[U.S. Department of Defense]]'s [[NIPRNet]]. Originally designed as a means to automate authentication – allowing someone who was already logged into one host in the network to connect to another on the same network without needing to re-authenticate – it was first formally described by BBN's Brian Anderson TAC Access Control System Protocols, BBN Tech Memo CC-0045 with minor TELNET double login avoidance change in December 1984 in [[IETF]] RFC 927.<ref name="dooley">{{cite book | author1=Dooley, Kevin | url=http://shop.oreilly.com/product/9780596003678.do | title=Cisco Cookbook | publisher=O'Reilly Media | author2=Brown, Ian | year=2003 | pages=137 | isbn=9781449390952 | url-status=live | archive-url=https://web.archive.org/web/20160624221754/http://shop.oreilly.com/product/9780596003678.do | archive-date=2016-06-24 }}</ref>{{ref RFC|927}} [[Cisco Systems]] began supporting TACACS in its networking products in the late 1980s, eventually adding several extensions to the protocol. In 1990, Cisco's extensions on top of TACACS became a proprietary protocol called Extended TACACS (XTACACS). Although TACACS and XTACACS are not open standards, Craig Finseth of the University of Minnesota, with Cisco's assistance, published a description of the protocols in 1993 as [[Internet Engineering Task Force|IETF]] RFC 1492 for informational purposes.<ref name="dooley" /><ref name="ballad">{{cite book | title=Access Control, Authentication, and Public Key Infrastructure | publisher=Jones & Bartlett Learning | author1=Ballad, Bill | author2=Ballad, Tricia | author3=Banks, Erin | year=2011 | pages=278β280 | isbn=9780763791285}}</ref>{{ref RFC|1492}}
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)