Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Create a User

You are here: Device Administration>Users & Roles>Users.

To add a user:

  1. Click + on the upper-right corner of the User Details table.

    The Create User page appears.

  2. Complete the configuration according to the guidelines provided in Table 1.
  3. Click OK to return to the Users page. If you want to discard your changes, click Cancel.
  4. Click Save to save the newly added user configurations. If you want to discard your changes, click Cancel.
Table 1: Fields on the Create User Page

Field

Description

Username

Enter a unique name for the user. Do not include spaces, colons, or commas in the username.

Login ID

Enter a unique ID for the user.

Range: 100 through 64000.

Full Name

Enter the user’s full name. If the full name contains spaces, enclose it in quotation marks. Do not include colons or commas.

Password

Enter a login password for the user. The login password must meet the following criteria:

  • The password must be at least 6 characters long.

  • You can include most character classes in a password (alphabetic, numeric, and special characters), except control characters.

Confirm password

Reenter the password for the user.

Role Scope

Note:

This option is only available on the SRX Series Firewalls that support multi-tenancy.

Select one of the role scopes to assign to the user:

  • Default—Assigns the role to root logical systems user.

  • Tenant—Assigns the role to tenant user.

  • Logical System—Assigns the role to logical system user.

Tenant

Select the tenant profile from the list for which you want to assign the role.

Note:

This option is only available if you select Tenant in the Role scope field.

Logical System

Select the logical system profile from the list for which you want to assign the role.

Note:

This option is only available if you select Logical System in the Role scope field.

Role

Select the user’s role from the list.

Authentication Methods

Authentication Method And Order

Enable authentication methods and drag and drop to change the authentication order. The options available are:

  • Password

  • RADIUS Servers

  • TACACS+Servers

RADIUS Servers

RADIUS Servers

Specifies the details of RADIUS servers.

To add a new RADIUS server:

  1. Click Configure.

    The RADIUS Servers page appears.

  2. Click + and enter the following details:

    • IP Address—Enter the server’s 32–bit IP address.

    • Password—Enter the secret password for the server.

    • Confirm Password—Re-enter the secret password for the server.

    • Server Port—Enter an appropriate port.

    • Source IP Address—Enter the source IP address of the server.

    • Retry Attempts—Specify the number of times that the server should try to verify the user’s credentials.

  3. Click OK to save the changes.

To delete an existing RADIUS server, select it and click the Delete icon.

TACACS

TACACS Servers

Specifies the details of TACACS servers.

To add a new TACACS server:

  1. Click Configure.

    The TACACS Servers page appears.

  2. Click + and enter the following details:

    • IP Address—Enter the server’s 32–bit IP address.

    • Password—Enter the secret password for the server.

    • Confirm Password—Re-enter the secret password for the server.

    • Server Port—Enter an appropriate port.

    • Source IP Address—Enter the source IP address of the server.

    • Timeout—Specify the amount of time (in seconds) the device should wait for a response from the server.

  3. Click OK to save the changes.

To delete an existing TACACS server, select it and click the Delete icon.

Password Settings
Note:

J-Web interface does not support configuring the number of characters by which the new password should be different from the existing password.

Minimum Reuse

Click up or down arrow to specify the number of old passwords which should not match the new password.

Range: 1 through 20

Maximum Lifetime

Click up or down arrow to specify the duration of a password (in days), where the password expires after the maximum duration is reached.

Range: 30 through 365

Minimum Lifetime

Click up or down arrow to specify the duration of a password (in days) before the password can be changed.

Range: 1 through 30