Given that there will be more than one person administering the ACI fabric, it makes sense that each have their own user account. This is a necessity for certifications such as PCI-DSS, and also just makes sense from an auditing perspective.
In this chapter, we will look at how we can connect to third-party authentication sources, such as RADIUS, TACACS+, and LDAP, and how we can limit the users down by a per-tenant or per-function basis.