Administrator accounts control access to firewalls and Panorama. A firewall administrator can have full or read-only access to a single firewall or to a virtual system on a single firewall. Firewalls have a predefined
account that has full access.
The following authentication options are supported:
—The administrator enters a username and password to log in. This authentication requires no certificates. You can use it in conjunction with authentication profiles, or for local database authentication.
Client certificate authentication (web)
—This authentication requires no username or password; the certificate suffices to authenticate access to the firewall.
Public key authentication (SSH)
—The administrator generates a public/private key pair on the machine that requires access to the firewall, and then uploads the public key to the firewall to allow secure access without requiring the administrator to enter a username and password.
To add an administrator, click
and fill in the following information.
Administrator Account Setting
Enter a login name for the administrator (up to 31 characters). The name is case sensitive and must be unique. Use only letters, numbers, hyphens, periods, and underscores. Login names cannot start with a hyphen (-).
Select an authentication profile for administrator authentication. You can use this setting for RADIUS, TACACS+, LDAP, Kerberos, or local database authentication. For details, see
Device > Authentication Profile.
Use only client certificate authentication (web)
Select this option to use client certificate authentication for web access. If you select this option, a username and password are not required; the certificate is sufficient to authenticate access to the firewall.
Confirm New Password
Enter and confirm a case-sensitive password for the administrator (up to 31 characters). You can also select
Setup > Management
to enforce a minimum password length.
To ensure that the firewall management interface remains secure, we recommend that you periodically change administrative passwords using a mixture of lower-case letters, upper-case letters, and numbers. You can also configure
Minimum Password Complexity settings for all administrators on the firewall.
Use Public Key Authentication (SSH)
Select this option to use SSH public key authentication. Click
and browse to select the public key file. The uploaded key appears in the read-only text area.
Supported key file formats are IETF SECSH and OpenSSH. Supported key algorithms are DSA (1024 bits) and RSA (768-4096 bits).
If the public key authentication fails, the firewall prompts the administrator for a username and password.
Assign a role to this administrator. The role determines what the administrator can view and modify.
If you select
Role Based, select a custom role profile from the drop-down. For details, see
Device > Admin Roles.
If you select
Dynamic, you can select one of the following predefined roles:
—Has full access to the firewall and can define new administrator accounts and virtual systems. You must have superuser privileges to create an administrative user with superuser privileges.
(read-only)—Has read-only access to the firewall.
—Has full access to all firewall settings except for defining new accounts or virtual systems.
(read-only)—Has read-only access to all firewall settings except password profiles (no access) and administrator accounts (only the logged in account is visible).
Virtual system administrator
—Has access to specific virtual systems on the firewall to create and manage specific aspects of virtual systems (if Multi Virtual System Capability is enabled). A virtual system administrator doesn’t have access to network interfaces, virtual routers, IPSec tunnels, VLANs, virtual wires, DHCP, DNS Proxy, QoS, LLDP, or network profiles.
Virtual system administrator
(read-only)—Has read-only access to specific virtual systems on the firewall to view specific aspects of virtual systems (if Multi Virtual System Capability is enabled). A virtual system administrator with read-only access doesn’t have access to network interfaces, virtual routers, IPSec tunnels, VLANs, virtual wires, DHCP, DNS Proxy, QoS, LLDP, or network profiles.
Virtual system administrator role only
to select the virtual systems that the administrator can manage.