Authentication Methods
Release | Modification |
---|---|
5.6.0 | Feature introduced |
6.2.4 | Enabled automatic account creation for authorized RADIUS users |
Overview
Either RADIUS or LDAP remote authentication can be configured on a system. If RADIUS authentication is rejected or if the RADIUS Server is not available, then LDAP authorization is requested.
Configuring RADIUS
When authenticating from a RADIUS server, the user is authenticated against the configured credentials. When account-creation
is set to automatic
, users are added and identified on the server, with each user account created automatically upon successful authentication on a local device. This provides a simple method for managing user accounts connected to a single authentication server with devices deployed over a wide geography.
If automatic account creation is enabled, users are configured on the RADIUS server using a RADIUS Vendor Specific Attribute (VSA) and user accounts are created on first login to the SSR based on the role specified in the VSA.
Configure the RADIUS Server
Using the RADIUS Vendor Specific Attribute (VSA) allows the administrator to identify users and assign them to a user role. The Juniper RADIUS VSA is Juniper-local-user-name
, and is type 1
. This is currently the only Juniper VSA supported by the SSR. The VSA Vendor ID indicates a Juniper system; the Juniper vendor ID is 2636. Each user is configured with a group in the form 128t-<role>
; for example, 128t-admin
or 128t-user
. When a user logs in they are assigned a new user account with that privilege level.
- On the RADIUS server, identify Juniper as the Vendor.
Vendor 2636, type 1, string
- Configure the users (Kevan and Paul), and identify their role (admin and user). This example is using FreeRadius.
Kevan Cleartext-Password := test123
Reply-Message = "Hello, %{User-Name}",
Juniper-Local-User-Name = "128t-admin"
Paul Cleartext-Password := test123
Reply-Message = "Hello, %{User-Name}",
Juniper-Local-User-Name = "128t-user"
Enable RADIUS Account Creation on the SSR
Automatic account creation is an option within the SSR configuration, based on data configured on the RADIUS server. Using the command config authority radius-server <name> account-creation <[ manual | automatic ]>
and setting automatic
enables users that exist in RADIUS to log in to the SSR.
config
authority
radius-server myradius
name myradius
address 172.18.2.183
port 8120
secret (removed) <--- testing123
account-creation automatic
timeout 10
exit
exit
exit
The first successful login to the SSR triggers the account creation, and after initial account creation the user session is terminated and the user will need to login again. Once a local account has been created on an SSR subsequent logins will function as normal.
[root@t128-dut1 centos]# ssh j1@localhost
j1@localhost's password:
Last login: Fri Feb 23 16:52:46 2024 from ::1
+---------------------------------------+
| |
| Welcome to: |
| |
| | . . ,---. . ,---. ,---. ,--. |
| | | | | | | |---' |---' | |
| | `---' ' ' ' ' `---' ' |
| ---' |
| __ ___ __ __ __ |
| |\ | |_ | | | / \ |__) |_/ (_ |
| | \| |__ | |/\| \__/ | \ | \ __) |
| |
| Session Smart Networking Platform ... |
+---------------------------------------+
Creating User Account...
Account created. Please log in again.
Connection to localhost closed.
[root@t128-dut1 centos]# ssh j1@localhost
j1@localhost's password:
Last login: Wed Mar 6 15:52:18 2024 from ::1
+---------------------------------------+
| |
| Welcome to: |
| |
| | . . ,---. . ,---. ,---. ,--. |
| | | | | | | |---' |---' | |
| | `---' ' ' ' ' `---' ' |
| ---' |
| __ ___ __ __ __ |
| |\ | |_ | | | / \ |__) |_/ (_ |
| | \| |__ | |/\| \__/ | \ | \ __) |
| |
| Session Smart Networking Platform ... |
+---------------------------------------+
j1@conductor-node-1.Conductor#
Manual User Configuration
The manual operation is still available by default, and requires the previous configuration process where create user
must be run with authentication-type
set to remote
.
admin@conductor-node-1.Conductor# create user
Username: test
Full Name: Test
Authentication Type (remote or local): remote
Roles (space separated): admin
Enabled (true or false): true
Account 'test' successfully created
admin@conductor-node-1.Conductor#
LDAP User Authentication
LDAP users are remotely administered and remotely authenticated. For information about configuring LDAP users, please refer to LDAP User Account Requirements.
Local Users
Local users are locally administered and locally authenticated.
The create user
command allows administrators to create user accounts for user and administrative access to the SSR router's management port. Issuing the create user <username>
prompts for the new user's full name, password, whether they are an administrative or basic user, and the enabled/disabled state of that user account.
admin@labsystem1.fiedler# create user jdeveloper
Creating account "jdeveloper"...
Full Name: Joe Developer
Authentication Type (remote or local): local
Password: <not echoed to screen>
Confirm: <not echoed to screen>
Role (user | admin) [user]: admin
Enabled: true
Account "jdeveloper" successfully created
Password requirements are available in Password Policies.