Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

FIPS Mode Roles and Services for Junos OS

Learn about FIPS mode roles and services for Junos OS.

FIPS Mode Roles and Services

In FIPS mode, a role refers to the specific functions or responsibilities that users have when interacting with the cryptographic module. The primary roles in FIPS mode include:

  1. Security Administrator role
  2. FIPS user role

Security Administrator and FIPS users perform all configuration tasks for Junos OS in FIPS mode and issue all statements and commands. Security Administrator and FIPS user configurations must follow the Junos OS in FIPS mode guidelines.

The Junos OS running in non-FIPS mode allows a wide range of capabilities for users, and authentication is identity-based.

Security Administrator Role and Responsibilities

The Security Administrator role is associated with the defined login class security-admin. Security Administrator has the necessary permissions to perform all tasks necessary to manage Junos OS. The system requires administrative users (Security Administrator) to provide unique identification and authentication data before granting any administrative access.

Best Practice:

We recommend that the Security Administrator administer the system in a secure manner by keeping passwords secure and checking audit files.

The permissions that distinguish the Security Administrator from other FIPS users are secret, security, maintenance, and control permissions. The Security Administrator has the login class that contains all these permissions.

The Security Administrator role is crucial for maintaining the integrity and security of the system, especially in environments that require adherence to stringent federal security standards.

The Security Administrator roles and responsibilities are as follows:

  1. Administer locally and remotely.

  2. Create, modify, and delete user accounts, including configuration of authentication failure parameters.

  3. Re-enable a user account.

  4. Configure and maintain cryptographic elements related to the establishment of secure connections to and from the evaluated product.

  5. Reset user passwords with FIPS-approved algorithms.

  6. Examine log and audit files for events of interest.

  7. Erase user-generated files, keys, and data by zeroizing the device.

FIPS User Role and Responsibilities

A FIPS user is defined as any user that does not have the secret, security, maintenance, and control permissions.

All FIPS users, including the Security Administrator, can view the configuration. Only the user assigned as the Security Administrator can modify the configuration. FIPS user can view status output but cannot reboot or zeroize the device.

What Is Expected of All FIPS Users

All FIPS users, including the Security Administrator, must always observe security guidelines and they must:

  • Keep all passwords confidential.

  • Store devices and documentation in a secure area.

  • Deploy devices in secure areas.

  • Check audit files periodically.

  • Conform to all other FIPS 140-3 security rules.

  • Responsible for the security of the device always.

Configure Security Administrator Login Access

Junos OS in FIPS mode offers a finer granularity of user permissions than those mandated by FIPS 140-3. For FIPS 140-3 compliance, any FIPS user with the secret, security, maintenance, and control permission is a Security Administrator. In most cases the super-user class suffices for the Security Administrator.

Junos OS login classes define the access privileges, permissions for using CLI commands and statements. For details, see Login Classes Overview.

To configure login access for a Security Administrator:

  1. Log in to the device with the root password and enter configuration mode:
  2. Name the user security-administrator. Assign the Security Administrator a user ID (for example, 6400, which must be a unique number associated with the login account in the range of 100 through 64000) and assign a class (for example, super-user). When you assign the class, you assign the permissions—for example, secret, security, maintenance, and control.

    For example:

  3. Assign the Security Administrator a plain-text password for login authentication, see Password Specifications and Guidelines for Junos OS in FIPS Mode. Set the password by typing a password after the prompts New password and Retype new password.

    For example:

  4. Optionally, display the configuration:
  5. If you are done with configuring the device, commit the changes and exit the configuration mode:

Configure FIPS User Login Access

As a Security Administrator, you can create FIPS users. The system does not permit FIPS users to have the permissions usually given to the Security Administrator—for example, the permission to zeroize the system.

To configure login access for a FIPS user:

  1. Log in to the device with your Security Administrator password and enter configuration mode:
  2. Give the user, a username, and assign the user a user ID (for example, 6401, which must be a unique number in the range of 1 through 64000) and a class. When you assign the class, you assign the permissions—for example, clear, network, resetview, and view-configuration.

    For example:

  3. Following the guidelines in Password Specifications and Guidelines for Junos OS in FIPS Mode, assign the FIPS user a plain-text password for login authentication. Set the password by typing a password after the prompts New password and Retype new password.

    For example:

  4. Optionally, display the configuration:
  5. If you are done with configuring the device, commit the changes and exit the configuration mode: