identity-management
Syntax
identity-management { authentication-entry-timeout minutes; batch-query { items-per-batch items-per-batch; query-interval seconds; } connection { connect-method (http | https); port port; primary { address address; ca-profile ca-profile; client-id client-id; client-secret client-secret; interface interface-name; routing-instance routing-instance -name; source source-address; } query-api query-api; secondary { address address; ca-profile ca-profile; client-id client-id; client-secret client-secret; interface interface-name; routing-instance routing-instance -name; source source-address; } server-validity-check-interval; token-api token-api; } filter { domain name; exclude-ip { address-book book-name; address-set address-set; } include-ip { address-book book-name; address-set address-set; } } invalid-authentication-entry-timeout minutes; ip-query { no-ip-query; query-delay-time seconds; } jims-validator { port port; } session-batch-query { items-per-batch; query-interval seconds; } session-query { no-session-query; query-delay-time seconds; } traceoptions { file <filename> <files files> <match match> <size size> <(world-readable | no-world-readable)>; flag name; level (all | error | info | notice | verbose | warning); no-remote-trace; } }
Hierarchy Level
[edit services user-identification]
Description
Configure identity management to collect identity
information. The SRX Series or NFX Series device relies on JIMS to
obtain user identity information much in the same way that it does
LDAP. By configuring the identity-management
, the device
can query JIMS for identity information, populate identity management
authentication table with the information that is obtained from JIMS
and use the populated identity management authentication table to
authenticate a user or a device requesting access to a protected resource.
Options
authentication-entry-timeout | Authentication entry timeout number (0, 10-1440) (minutes)
|
invalid-authentication-entry-timeout | Invalid authentication entry timeout number (0, 10-1440) (minutes)
|
file | Configure the trace file options.
|
flag | —Trace operation to perform. |
level | -Level of debugging output.
|
no-remote-trace | —Set remote tracing as disabled. |
The remaining statements are explained separately. See CLI Explorer.
Required Privilege Level
system
Release Information
Statement introduced in Junos OS Release 15.1X49-D100.