Configuring authentication order – Juniper Networks J-Series User Manual
Page 37

Configuring Authentication Order
The procedure provided in this section configures the Services Router to attempt
user authentication with the local password first, then with the RADIUS server, and
finally with the TACACS+ server.
To configure authentication order:
1.
Navigate to the top of the configuration hierarchy in either the J-Web or CLI
configuration editor.
2.
Perform the configuration tasks described in Table 13 on page 15.
3.
If you are finished configuring the network, commit the configuration.
To completely set up RADIUS or TACACS+ authentication, you must configure
at least one RADIUS or TACACS+ server and create user template accounts.
4.
Go on to one of the following procedures:
■
To configure a RADIUS server, see “Setting Up RADIUS
Authentication” on page 12.
■
To configure a TACACS+ server, see “Setting Up TACACS+
Authentication” on page 13.
■
To configure a remote user template account, see “Creating a Remote
Template Account” on page 19.
■
To configure local user template accounts, see “Creating a Local Template
Account” on page 20.
Table 13: Configuring Authentication Order
CLI Configuration Editor
J-Web Configuration Editor
Task
From the
[edit]
hierarchy level, enter
edit system
1.
In the J-Web interface, select
Configuration>View and Edit>Edit
Configuration.
2.
Next to System, click Configure or Edit.
Navigate to the System level in
the configuration hierarchy.
Insert the
radius
statement in the
authentication order:
insert system authentication-order radius
after password
1.
In the Authentication order box, click Add
new entry.
2.
In the list, select radius.
3.
Click OK.
Add RADIUS authentication to
the authentication order.
Insert the
tacplus
statement in the
authentication order:
insert system authentication-order tacplus
after radius
1.
In the Authentication Order box, click Add
new entry.
2.
In the list, select tacplus.
3.
Click OK.
Add TACACS+ authentication to
the authentication order.
Managing User Authentication with a Configuration Editor
■
15
Chapter 1: Managing User Authentication and Access