Administrators List & External Database Admin Settings

Admin Privileges

Admin users are the administrators of a security device. There are five kinds of admin users.

Although the profile of the root user of a security device must be stored in the local database, you can store vsys users and root-level admin users with read-write and read-only privileges either in the local database or on an external auth-server.

If you store admin user accounts on an external auth server and you load the dictionary file on the auth server (see RADIUS Server), you can elect to query admin privileges defined on the server. Optionally, you can specify a privilege level to be applied globally to all admin users stored on that auth server. You can specify either read/write or read-only privileges. If you store admin users on an external auth server such as SecurID, LDAP, TACACS+, or a RADIUS server without the security device dictionary file, you cannot define their privilege attributes on the auth server. Therefore, you must assign a privilege level to them on the security device.

To Set an Auth Server for Admin Users and Set Privileges

  1. Select the type of privileges to grant admin users authenticating from an external database:

Get privilege from RADIUS server: Select this option to query admin privileges defined on the RADIUS server.

External admin has read-only privilege: Select this option to grant read-only privileges to the admin user.

External admin has read-write privilege: Select this option to grant read-write privileges to the admin users.

Admin Auth Server: Select a server from the drop-down list to authenticate admin users.

  1. Click Apply to save the settings.

Remote Server Settings

ScreenOS allows you to prioritize the authentication process between the local and remote authentication services.

Primary: The remote auth server has a higher priority to authenticate over the local database.

Fallback: If the primary authentication service fails, configure the device to authenticate to the secondary service (default) or bypass it. This action is defined differently for root-privileged and non-root privileged admins.

For example, select Permit Root to accept remote root-privileged admins only to be authenticated by the remote auth server. Then, non-root privileged admins authenticated by remote auth servers are not accepted by the device.

Root: Accept root-privileged admins authenticated by the remote auth server.  

Creating Administrators

In addition to the root administrator, the security device supports the creation of up to 20 admin users, which can be either super administrators (with read-write privileges) or sub-administrators (with read-only privileges).

Note: An external admin logging in with root-privileges can log in multiple times with root privileges provided the same username and password is used.  However, subsequent root-level admins logging into the device will have read-write privileges only and not root-privileges. This prevents different multiple root users logging into the device.

The security device identifies users by user name and password. Only the root administrator can change or add admin users. Admin users can change their own passwords, but not the root administrator's password.

To Create a New Administrator

To create an administrator, click New. The Administrators Configuration page appears. For more information on creating administrators, see the Administrator Configuration page.

Local Administrator Database

This table lists all the administrators who can manage the security device. You can modify all administrators—root and sub-administrators—and you can remove all sub-administrators. The table contains the following information:

Administrator Name: Identifies the name of the administrator.

Privileges: Identifies which administration privileges the administrator is entitled to.

SSH Password Auth: Indicates whether SSH password authentication is enabled.

Configure: Click Edit to modify the administrator's password. Click SSH PKA to view or modify the administrator's PKAs and create new ones. Click Remove to remove the administrator (only a root administrator can remove an admin user).

For more information on modifying an administrator, see Administrator Configuration.

For more information on viewing and creating PKAs, see PKA List & Configuration.