Hi,
Jean-Christoph used tacacsgui which is using tac_plus distribution by http://www.pro-bono-publico.de/projects/tac_plus.html.
Using local users as described by Jean-Christoph is working.
But in case you will use MAVIS module to connect to LDAP user backend, the privilege level escalation will accidently work for all users with default settings.
The reason is, that in case of TACACS, checkpoint is not using the real authorization (sending the name of role for the user by AV pair). The authorization is working only with RADIUS. It is confusing, because TACACS was originally developed for that purpose. In oppose, RADIUS was originally developed for remote user dial-in authentication like RA VPN, WiFi etc.
Solution, in case of tacacsgui is to disable the option "enable password as login" in Mavis module -> Mavis LDAP and for user who needs for example access escalation to enable 7 use manual settings on user-group in tacacsgui bellow:
enable 7 =login
enable 15=deny
For user, who need access escalation to enable 15, just use manual settings on user-group in tacacs gui like:
enable 15=login
I have setted up several technologies with tacacsgui like Aruba Instant, Aruba Airwave, ArubaOS, Cisco, FortiOS, OneAccess, Linksys... All of them supports the true TACACS autorization. Checkpoint NOT - WTF?!
The other thing which is not properly done in GAIA is the fact, that in case the user has no service in TACACS defined like:
service = shell {
....
}
The user is allowed to log in!
Regards
Tomas