Navigation
Supported Platforms
Related Documentation
- LN, SRX Series
- Understanding User Authentication Methods
- Example: Configuring a RADIUS Server for System Authentication
- Example: Configuring a TACACS+ Server for System Authentication
- Example: Configuring Authentication Order
- Additional Information
- Administration Guide for Security Devices
Understanding User Accounts
User accounts provide one way for users to access the device. Users can access the device without accounts if you configured RADIUS or TACACS+ servers. After you have created an account, the device creates a home directory for the user. An account for the user root is always present in the configuration. For each user account, you can define the following:
- Username—Name that identifies the user. It must be unique within the device. Do not include spaces, colons, or commas in the username.
- User's full name—If the full name contains spaces, enclose it in quotation marks (“ ”). Do not include colons or commas.
- User identifier (UID)—Numeric identifier that is associated with the user account name. The identifier range from 100 through 64,000 and must be unique within the device. If you do not assign a UID to a username, the software assigns one when you commit the configuration, preferring the lowest available number.
- User's access privilege—You can create login classes with specific permission bits or use one of the predefined classes.
- Authentication method or methods and passwords that the user can use to access the device—You can use SSH or an MD5 password, or you can enter a plain-text password that Junos OS encrypts using MD5-style encryption before entering it in the password database. If you configure the plain-text-password option, you are prompted to enter and confirm the password.
Related Documentation
- LN, SRX Series
- Understanding User Authentication Methods
- Example: Configuring a RADIUS Server for System Authentication
- Example: Configuring a TACACS+ Server for System Authentication
- Example: Configuring Authentication Order
- Additional Information
- Administration Guide for Security Devices
Modified: 2013-08-13
Supported Platforms
Related Documentation
- LN, SRX Series
- Understanding User Authentication Methods
- Example: Configuring a RADIUS Server for System Authentication
- Example: Configuring a TACACS+ Server for System Authentication
- Example: Configuring Authentication Order
- Additional Information
- Administration Guide for Security Devices