inherit existing-role-nameEnter the inherit keyword then specify the system defined role to inherit permissionsfrom (sysadmin, secadmin, netadmin, netoperator).Defaults noneCommand Modes CONFIGURATIONCommand History This guide is platform-specific. For command information about other platforms, see the relevant Dell NetworkingOS Command Line Reference Guide.Version Description9.10(0.0) Introduced on the S6100-ON.9.8(1.0) Introduced on the Z9100-ON.9.8(0.0P5) Introduced on the S4048-ON.9.8(0.0P2) Introduced on the S3048-ON.9.7(0.0) Introduced on the S6000-ON.9.5(0.0) Introduced on the Z9000, S6000, S4820T, S4810, and MXL.Usage Information By default, access to commands are determined by the user’s role (if defined) or by the user’s privilege level. If theaaa authorization role-only command is enabled, then only the user’s role is used.Before you enable role-based only AAA authorization:1 Locally define a system administrator user role.This will give you access to login with full permissions even ifnetwork connectivity to remote authentication servers is not available.2 Configure login authentication on the console. This ensures that all users are properly identified throughauthentication no matter the access point3 Specify an authentication method (RADIUS, TACACS+, or Local).4 Specify authorization method (RADIUS, TACACS+ or Local).5 Verify the configuration has been applied to the console or VTY line.Related Commands login authentication, password, radius-server host, tacacs-server hostroleChanges command permissions for roles.Syntax role mode { { { addrole | deleterole } role-name } | reset } commandTo delete access to a command, use the no role mode role-nameParametersmode Enter one of the following keywords as the mode for which you are controlling access:configure for CONFIGURATION modeexec for EXEC modeinterface for INTERFACE modes1468 Security