Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
Junos CLI Reference
Table of Contents Expand all
list Table of Contents
file_download PDF
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
English
keyboard_arrow_right

ldap-options

date_range 19-Nov-23

Syntax

content_copy zoom_out_map
ldap-options {
        revert-interval seconds;
        base-distinguished-name base-distinguished-name;
        search {
            admin-search;
        }
        allowed-groups {
            group-name {
                address-assignment {
                    pool pool-name;
                }
        }
    }
    ldap-server {
        ip address;
    }
}
address-assignment {
    pool pool-name1 {
        family inet {
            network 100.127.255.255/10;
            xauth-attributes {
                primary-dns 100.127.255.255/12;
                secondary-dns 110.127.255.255/12;
                primary-wins 100.127.255.255/12;
                secondary-wins 110.127.255.255/12;
            }
        }
    }
    pool pool-name2 {
        family inet {
            network 120.127.255.255/10;
            xauth-attributes {
                primary-dns 120.127.255.255/12;
                secondary-dns 130.127.255.255/12;
                primary-wins 120.127.255.255/12;
                secondary-wins 130.127.255.255/12;
            }
        }
    }
}
firewall-authentication {
    web-authentication {
        default-profile default-profile-name;
    }
}

Hierarchy Level

content_copy zoom_out_map
[edit access],
[edit access profile profile-name authentication-order ldap]

Description

Configure LDAP authentication options.

You can configure user groups using ldap-options command for the user groups that are user authenticated. You can authenticate users that are assigned roles according to their LDAP group memberships. The allowed-groups attribute authenticates users that are assigned according to their group memberships. If none of the user groups match a user group, then the user cannot access the system.

Membership characteristics are queried from the LDAP server as per configuration. After firewall authentication, a user can be assigned IP addresses from the associated pools with the authenticated group.

Options

allowed-groups Allow members of only specific groups to sign in. Group lists are limited to 255 bytes.

The order in which the membership attribute is received from the LDAP server determines how a user is associated with the configured (allowed) groups. To match the user, the first group in the list received from the LDAP server that matches any of the configured groups is used.

Any user who is a member of more than one group can obtain resources from either group, depending on the order of the LDAP server's response. To ensure that the user is assigned the intended resource with certainty, it is recommended that the user belong to only one group.

group-name Name of the group which should be allowed.
name Address pool name

The remaining options are explained separately. Search for a statement in CLI Explorer or click a linked statement in the Syntax section for details.

Required Privilege Level

access—To view this statement in the configuration.

access-control—To add this statement to the configuration.

Release Information

Statement introduced in Release 8.5 of Junos OS.

allowed-groups option introduced in Release 21.4R1 of Junos OS.

footer-navigation