You can specify extended regular expressions with the allow-configuration and deny-configuration attributes to define user access privileges to parts of the configuration hierarchy or individual configuration mode commands. Doing so overrides any login class permission flags set for a user. You can also use wildcards to restrict access. When you define access privileges to parts of the configuration hierarchy or individual configuration mode commands, do the following:
- [edit system login class class-name]
- user@host# set deny-configuration "(system
login class) | (system services)"
![]() |
Note: Each expression separated by a pipe | symbol must be a complete standalone expression, and must be enclosed with parentheses ( ). Do not use spaces between regular expressions separated by parentheses and connected with the pipe | symbol. You cannot define access to keywords such as set, edit, or activate. |
For more information about how to use wildcards, see Table 9.
To explicitly allow an individual configuration mode command that would otherwise be denied, include the allow-configuration statement at the [edit system login class class-name] hierarchy level:
- [edit system login class class-name]
- allow-configuration “regular-expression”;
To explicitly deny an individual configuration mode command that would otherwise be allowed, include the deny-configuration statement at the [edit system login class class-name] hierarchy level:
- [edit system login class class-name]
- deny-configuration “regular-expression”;
If the regular expression contains any spaces, operators, or wildcard characters, enclose it in quotation marks. Regular expressions are not case-sensitive.
You can include one deny-configuration and one allow-configuration statement in each login class.
Use extended regular expressions to specify which configuration mode commands are denied or allowed. You specify these regular expressions in the allow-configuration and deny-configuration statements at the [edit system login class] hierarchy level, or by specifying attributes, that are specific to JUNOS, in your TACACS+ or RADIUS authentication server’s configuration. You must specify that these regular expressions are sent as the value of Juniper Networks vendor-specific attributes. If regular expressions are received during TACACS+ or RADIUS authentication, they merge with any regular expressions configured on the local router. For information about TACACS+ or RADIUS authentication, see the JUNOS System Basics Configuration Guide.
Command regular expressions implement the extended (modern) regular expressions, as defined in POSIX 1003.2. Table 9 lists common regular expression operators.
Table 9: Configuration Mode Commands—Common Regular Expression Operators
The following examples show how to configure access privileges to individual configuration mode commands.
If the following statement is included in the configuration and the user’s login class permission flag is set to all, the user cannot configure telnet parameters:
- [edit system login class class-name]
- user@host# set deny-configuration "system
services telnet"
If the following statement is included in the configuration and the user’s login class permission flag is set to all, the user cannot issue login class commands within any login class whose name begins with the letter m:
- [edit system login class class-name]
- user@host# set deny-configuration "system
login class m.*"
If the following statement is included in the configuration and the user’s login class permission flag is set to all, the user cannot issue configuration mode commands at the system login class or system services hierarchy levels:
- [edit system login class class-name]
- user@host# set deny-configuration "(system
login class) | (system services)"
Configure permissions for individual configuration mode commands:
- [edit]
- system {
-
- login {
- # This login class has operator privileges and the additional
ability to
- # issue commands at the system services hierarchy.
-
- class only-system-services {
- permissions [ configure ];
- allow-configuration "system services";
- }
- # This login class has operator privileges but can't issue
any system
- # services commands.
-
- class all-except-system-services {
- permissions [ all ];
- deny-configuration "system services";
- }
- }
- }