Configuring System Authentication

You can use the User Management page to configure the authentication methods that the device uses to verify that a user can gain access. For each login attempt, the device tries the authentication methods in order, starting with the first one, until the password matches.

If you do not configure system authentication, users are verified based on their configured local passwords.

To configure system authentication:

  1. In the J-Web interface, select Configure > System Properties > User Management.

    Note: After you make changes to the configuration in this window, you must commit the changes immediately for them to take effect. To commit all changes to the active configuration, select Commit Options > Commit. See Using the Commit Options to Commit Configuration Changes (J-Web Procedure) for details about all commit options.

  2. Click Edit. The Edit User Management dialog box appears.
  3. Select the Authentication Method and Order tab.
  4. Under Available Methods, select the authentication method the device should use to authenticate users, and use the arrow button to move the item to the Selected Methods list. Available methods include:
    • RADIUS
    • TACACS+
    • Password

    If you want to use multiple methods to authenticate users, repeat this step to add the additional methods to the Selected Methods list.

  5. Under Selected Methods, use the up and down arrows to specify the order in which the device should execute the authentication methods.
  6. Click OK.