
Manage Administrator Access


Secures critical infrastructure
We recommend InkBridgeTACACS+ when your business needs centralized authentication and authorization of administrator access to network devices. Our TACACS+ product controls and monitors access to network devices such as routers and switches.
Command-level authorization
In high-security environments, it can be important to control the specific commands that different users can execute on critical network devices. InkBridgeTACACS+ allows for highly granular control for your unique use cases.
Centralized management
InkBridgeTACACS+ is fully integrated with our policy engine, making it easier to control and maintain user accounts. Our centralized approach reduces administrative overhead for managing access to critical infrastructure.
Detailed logging for compliance
For compliance-heavy industries, InkBridgeTACACS+ maintains detailed records of user activities such as login and logout times, commands executed, and resources accessed.
Who We’ve Helped









Protocols supported
We support an exhaustive range of authentication protocols.
- PAP
- CHAP
- MS-CHAP
- EAP
- PEAP
- EAP-TLS
Databases supported
InkBridgeTACACS+ is completely database agnostic. If you already have database infrastructure, we can work with it, including:
- MySQL
- Active Directory
- Open LDAP
- PostgreSQL
- Redis
- Oracle
- Microsoft SQL Server
- MongoDB
- IBM DB2
Clients supported
We work with all networking equipment and software, including:
- Network Access Servers
- 802.1x switches
- VPN servers
- NPS servers
- RADIUS proxy servers
- Routers
What is the difference between RADIUS and TACACS+?
The RADIUS and TACACS+ protocols have several similarities, leading to some confusion about which one to use, and in which scenario.
Both RADIUS and TACACS+ are AAA protocols, providing Authentication, Authorization, and Accounting capabilities. The primary difference is that RADIUS was designed to manage users accessing a network, while TACACS+ is most commonly used for administrator access to network devices such as routers, switches, firewalls, wireless access points, and NASs.
As many organizations are moving to a zero-trust security framework (never trust, always verify), TACACS+ can be a valuable tool for providing an additional level of network security. It also provides granular data on user activities, which makes it a good fit in compliance-heavy industries.


Get InkBridgeTACACS+
Find out how InkBridgeTACACS+ can be deployed into your ecosystem.
Focus on your business, not your network
Check out our full suite of foundational protocol products for RADIUS, DHCP, TACACS+, and DNS. Our products, coupled with world class professional services and support, ensures that your network is always fast, secure, and resilient.