Updated Date: 04/23/2026
User Management
You can manage the rSeries system from the CLI, the webUI, or using REST APIs.
The rSeries system has two levels of user management:
At the system level, after basic configuration is complete, the system includes default root (Bash access only) and admin accounts that you can use to log in to the system. The system administrator uses the admin account and changes the default passwords when logging in the first time. At that point, the admin user can also create additional accounts for other users, such as other system administrators, terminal server administrators, or operators.
Since the tenants are independent of the rest of the rSeries system, management of tenant users is not covered in this guide. For more information, see the tenant documentation (such as BIG-IP software documentation at my.f5.com).
There are multiple user roles for managing the rSeries system, and each role performs different sets of administrative actions at conceptually different levels.
This table lists user roles at the system level.
|
Role |
Description |
|---|---|
|
admin |
Provides access to the system CLI or webUI to configure the system-level settings with unrestricted read/write access. Can unlock any system users. Logs in to the active management IP address. No Bash access. Has broader ability and can configure management interfaces, install Base OS system software, modify system settings, activate licensing, perform user management, and configure network settings, port groups, interfaces, VLANs, LAGs, log settings, tenant deployments, and system settings. Important: The default login credentials are admin/admin. When logging in as admin for the first time, the system prompts you to change the password. This also changes the default password for the root account to match that of the admin account. |
|
limited |
F5 internal use only. |
|
operator |
Allows read access to system level configuration from the CLI or webUI and write access to change password only. Logs in to the active management IP address. No Bash access. Has read-only access to every screen and every configuration object at the level in which they are working. If an operator tries to modify any setting, however, the system displays a warning that explains that their role is unauthorized to make the configuration change. |
|
resource admin |
Similar to the Admin user role, but cannot create, modify, or delete local user accounts; create, modify, or delete server groups; or modify any authentication settings. This user role can modify their own user detail to change their own password. |
|
root |
Created by the system. Used by the system administrator. Provides Bash shell access to the entire system including all components. The root user is the only user that has Bash access. The system root account can be accessed from the management IP address and from a console. The root role can only be accessed by the root user. The root password can be changed using the Warning: F5 recommends disabling the root account using appliance mode in production to reduce the attack surface of the system and protect it from any vulnerabilities. |
|
tenant-console |
Has virtual console access to tenants from the CLI. Tenant console access is authenticated by tenant root credentials. No access to any part of the rSeries system. |
The rSeries system includes support for using a remote authentication server to store system user accounts. After you have created system accounts on the remote server (using the server vendor’s instructions), you can configure the rSeries system to use that server type to authenticate and authorize users. You can enable all available remote authentication methods and use the CLI to indicate the order in which you would like the methods to be attempted when a user logs in.
Users with the admin role can configure the system to use these authentication methods to authenticate users:
- External LDAP Server (includes Active Directory)
- External RADIUS Server
- External TACACS+ Server
- Local (local UNIX authentication)
Each user role is internally mapped to a group ID. Users created and managed on external LDAP, Active Directory, RADIUS, or TACACS+ servers must have the same group IDs on the external servers as they do on F5 rSeries systems to enable authentication and authorization to occur on rSeries systems. Users created on external LDAP, Active Directory, RADIUS, or TACACS+ servers must be associated with one of these group IDs on the system.
Important: You can only use existing roles and cannot create new roles.
The group IDs are specified in a user configuration file on the external server (file locations vary on different servers). You can assign these F5 user attributes:
F5-F5OS-UID=1001
F5-F5OS-GID=9000 <-- THIS MUST MATCH /etc/group items
F5-F5OS-HOMEDIR=/tmp <-- Optional; prevents sshd warning msgs
F5-F5OS-USERINFO=test_user <-- Optional user info
F5-F5OS-SHELL=/bin/bash <-- Ignored; always set to /var/lib/controller/f5_confd_cliSetting F5-F5OS-HOMEDIR=/tmp is a good idea to avoid warning messages from sshd that the directory does not exist. Also, the source address in the TACACS+ configuration is not used by the rSeries system.
If F5-F5OS-UID is not set, it defaults to 1001. F5-F5OS-GID is required; if not set, user authentication will fail. The F5-F5OS-USERINFO is a comment field. Essentially, F5-F5OS-GID is the only hard requirement and must coincide with the group ID’s user role.
This table lists the default group IDs for system roles.
| Role | Group ID |
|---|---|
| admin | 9000 |
| operator | 9001 |
| resource admin | 9003 |
| tenant-console | 9100 |
The user configuration file is often named /etc/raddb/users. This is an example of an entry for an administrator with admin privileges:
radius_user Cleartext-Password := test
F5-F5OS-UID := 1001,
F5-F5OS-GID := 9000,
F5-F5OS-HOMEDIR := "/tmp",
F5-F5OS-SHELL := "/var/lib/controller/f5_confd_cli"For example, on a TACACS+ server, the user configuration file is typically named /etc/tac_plus.conf. This is an example of an entry for an administrator with admin privileges:
group = admin {
service = ppp
protocol = ip
{
default attribute=permit
F5-F5OS-UID=1001
F5-F5OS-GID=9000
F5-F5OS-HOMEDIR=/tmp
F5-F5OS-USERINFO=test_user
}
}
user = test_tacacs_user {
global = cleartext "test-tacplus"
member = admin
}You can display the administrator roles with their associated group IDs from the CLI using an account with admin or operator access.
-
Log in to the command line interface (CLI) of the system using an account with admin access.
When you log in to the system, you are in user (operational) mode.
-
Display user roles for the system.
show system aaa authentication rolesA summary similar to this example displays:
appliance-1# show system aaa authentication roles REMOTE ROLENAME GID USERS GID ------------------------------------- admin 9000 - 9000 operator 9001 - 9001 resource-admin 9003 - 9003 root 0 - 0 tenant-console 9100 - 9100
Using an account with admin or operator access, you can configure a custom remote group ID (GID) for all remote authentication methods (LDAP, TACACS+, RADIUS). For example, this enables LDAP administrators to specify admin and operator groups, and then associate those GIDs to the associated roles rather than the hard-coded 9000 and 9001. The default GID fields (that is, 9000 and 9001) are not affected, and the system maps the remote GID to the default GID.
Important: You can assign remote GID mappings for only one remote authentication method at a time. If you switch from LDAP to RADIUS, for example, you will have to reconfigure the settings for RADIUS. If you then decide to go back to LDAP, you will have to reconfigure again. F5 recommends that you avoid assigning multiple F5-mapped GIDs to a single user account.
Using an account with admin or operator access, you can configure a custom group ID (GID) for all remote authentication methods (LDAP, TACACS+, RADIUS) from the CLI.
-
Log in to the command line interface (CLI) of the system using an account with admin access.
When you log in to the system, you are in user (operational) mode.
-
Change to config mode.
configThe CLI prompt changes to include
(config). -
Configure a remote GID.
system aaa authentication roles role <*role-name*> config remote-gidThis example assigns a remote GID to the admin user:
appliance-1(config)# system aaa authentication roles role admin config remote-gid (<unsignedInt>) (9000): 6000 -
Commit the configuration changes.
commit -
Return to user (operational) mode.
end -
Verify that the operator user role is assigned the custom remote GID.
show system aaa authentication rolesA summary similar to this example displays:
appliance-1# show system aaa authentication roles REMOTE ROLENAME GID USERS GID ------------------------------------- admin 9000 - 6000 operator 9001 - 9001 resource-admin 9003 - 9003 tenant-console 9100 - 9100
Verify that the remote GID for the user matches the GID on the remote authentication server.
You can configure the rSeries system to use an LDAP or Microsoft Windows Active Directory (AD) server for authenticating rSeries system user accounts.
Before you begin:
- Verify that the LDAP service is set up on a server that is accessible to the rSeries system. The default port for the LDAP service is 389 for unsecure protocol (LDAP) or 636 for secure protocol (LDAPS). If the service is configured with a different port, make note of it, as you will need that port number during configuration.
- Import one or more LDAP certificates if you want to verify the certificate of the authentication server.
- Assign users to valid system group IDs on the external LDAP or Active Directory servers. For more information, see Group IDs (GIDs) and system authentication roles.
- For the system to recognize an Active Directory user, the user’s uidNumber attribute must be set to a valid value. The gidNumber for important groups must also be set to a valid value. While these attributes are typically present in a basic LDAP configuration, they are often missing from a basic AD configuration.
You can configure the use of LDAP/Active Directory (AD) authentication with rSeries systems from the webUI.
-
Log in to the webUI using an account with admin access.
-
On the left, click USER MANAGEMENT > Authentication Settings.
-
To enable an external authentication server, in Authentication Methods, select LDAP.
The LDAP server must be configured and reachable from the system.
Note: By default, local authentication is always enabled, so an administrator can access the system in case of external authentication server failure.
-
In the Common LDAP Configuration area, for Base DN, type the base distinguished name (name-value pairs) from which to start the search for the LDAP user (for example,
dc=example,dc=org).Note: The settings in the Common LDAP Configuration area are required only if you want to use LDAP and create LDAP server groups with LDAP servers.
-
For Bind, specify the information for binding the LDAP service account.
-
For DN, enter the distinguished name with which to bind to the LDAP directory server for lookups (for example:
cn=admin,dc=example,dc=org). -
For Password, enter the admin password for the LDAP server.
Note: F5 recommends that the LDAP service account password is set to never expire. Otherwise, if it expires, LDAP authentication will not be possible and might result in users getting locked out of the system.
-
For Confirm, retype the password.
-
To clear the password, click Clear.
-
-
For Connect Timeout (seconds), specify the maximum amount of time, in seconds, that the system waits before timing out when trying to reach the LDAP server.
-
For Read Timeout (seconds), specify the maximum amount of time, in seconds, that the system waits to receive an LDAP response before aborting the read attempt.
-
For Idle Timeout (seconds), specify the maximum amount of time, in seconds, that an LDAP connection can be inactive before the connection is closed.
-
For LDAP Version, select the version of the LDAP protocol to use.
The default value is 3.
-
For Chase Referrals, select whether to enable LDAP referral chasing.
Note: The default value is True, which specifies that the system queries all LDAP servers in the domain. This might cause delays and timeouts when authenticating against an LDAP server.
-
If the LDAP server has Transport Layer Security (TLS) support, from the TLS list, select whether to use TLS to encrypt the transfer of authentication data between the LDAP server and the system.
Option Description On Use TLS to secure all connections. Off Do not use TLS. StartTLS Starts a connection in unencrypted mode on a port configured for plain text and negotiates the encryption with the client. If selected, it is used rather than raw LDAP over SSL. If set to On or StartTLS, additional TLS-related fields are enabled.
-
For TLS Certificate Validation, specify what checks to perform on a server-supplied certificate
Option Description Never TLS certificate is not required. Allow Allow the connection. The server certificate is requested. If no certificate is provided, the session proceeds normally. If a bad certificate is provided, it is ignored and the session proceeds normally. Try Request the TLS certificate. The server certificate is requested. If no certificate is provided, the session proceeds normally. If a bad certificate is provided, the session is immediately terminated. Demand Request the certificate. If no certificate is provided, or a bad certificate is provided, the session is immediately terminated. Hard Request the certificate. If no certificate is provided, or a bad certificate is provided, the session is immediately terminated. -
For TLS CA Certificate, click Show and paste the contents of the X.509 certificate (self-signed or from a CA) for peer authentication.
-
For Cipher String, enter the cipher string to specify the type of encryption to use (for example, ECDHE-RSA-AES256-GCM-SHA384 or ECDHE-RSA-AES128-GCM-SHA256).
The cipher string can take several additional forms. It can consist of a single cipher suite such as RC4-SHA. It can represent a list of cipher suites containing a certain algorithm, or cipher suites of a certain type. For example, SHA1 represents all cipher suites using the digest algorithm SHA1, and SSLv3 represents all SSLv3 algorithms.
You can combine lists of cipher suites into a single cipher string using the + character as a logical AND operation. For example, SHA1+DES represents all cipher suites containing the SHA1 and DES algorithms.
For additional information, see the ciphers man page at www.openssl.org/docs/manpages.html.
-
In the TLS Certificate field, click Show and paste the text of the local certificate for client TLS authentication.
-
In the TLS Key field, click Show and paste the text of the private key for client TLS authentication.
-
For Authenticate with Active Directory, select True if you want LDAP to authenticate against an Active Directory (AD) server.
-
Click Save.
LDAP/AD authentication for users is configured on the system. When a user logs in, the system attempts to authenticate them against the configured authentication method. When the account has a match within any of the configured authentication methods, the user is authenticated and given access.
Next, you can create a server group.
You can configure an LDAP/Active Directory (AD) server group from the webUI.
-
Log in to the webUI using an account with admin access.
-
On the left, click USER MANAGEMENT > Server Groups.
-
Click Add.
-
For Name, create a recognizable name for the server group.
-
For Provider Type, select LDAP to qualify the type of servers that will be in the group.
-
Click Save & Close.
-
Click the server group to which you want to add servers.
The Edit Server Group screen displays.
-
Click Add.
-
For Server, type the IPv4, IPv6 address, or FQDN of the LDAP server to add.
-
For Port, make sure the port number is correct for LDAP traffic.
The default value is 636.
-
From the Type list, select LDAP over TCP or LDAP over SSL (secured) depending on which is supported.
-
Click Save & Close.
Add as many servers as needed to the group.
You can configure LDAP/Active Directory authentication from the CLI. You can also create an LDAP server group (including Active Directory servers), if you have multiple external LDAP servers to which you want to connect.
-
Log in to the command line interface (CLI) of the system using an account with admin access.
When you log in to the system, you are in user (operational) mode.
-
Change to config mode.
configThe CLI prompt changes to include
(config). -
Set the authentication method to LDAP.
system aaa authentication config authentication-method LDAP_ALL -
Commit the configuration changes.
commit -
Set the LDAP or Active Directory configuration details.
system aaa authentication ldap active_directory { true | false } base <*dn-name*> bind_timelimit <*number-of-seconds*> binddn <*dn-acct-info*> bindpw <*password*> chase-referrals { true | false } idle_timelimit <*number-of-seconds*> ldap_version <*version-number*> ssl { on | off | start\_tls } timelimit <*number-of-seconds*> tls_cacert <*path-to-cert>* tls_cert <*path-to-cert*> tls_ciphers <*cipher-suite*> tls_key <*path-to-file*> tls_reqcert { never | allow | try | demand | hard }This example specifies a search base distinguished name for LDAP authentication:
appliance-1(config)# system aaa authentication ldap base dc=example,dc=localThis example enables Active Directory authentication, by setting the active_directory option to true:
appliance-1(config)# system aaa authentication config authentication-method LDAP all system aaa authentication ldap active_directory true -
Add the LDAP/AD server details to the authentication server groups.
-
Create a server group.
system aaa server-groups server-group <*group-name*> config name <*group-name*> type LDAPThis example creates an LDAP server group named ldap-group:
appliance-1(config)# system aaa server-groups server-group ldap-group config name ldap-group type LDAP -
Add a server to the server group.
servers server <*ip-address*> config address <*ip-address*>This example adds a server at specified IP address:
appliance-1(config-server-group-ldap-group)# servers server 192.0.2.21 -
Customize other LDAP configuration details, as needed.
ldap config auth-port <*port-number*> type { ldap | ldaps }This example shows configuring a port number and LDAP over SSL.
appliance-1(config-server-192.0.2.21)# ldap config auth-port 636 type ldaps -
Exit to the top level.
top -
Add the host name for the LDAP service.
Note: This host name might have to be resolved in
/etc/hostsor by DNS.system aaa server-groups server-group <*group-name*> servers server <*host-name*>This example adds a host name to the LDAP service:
appliance-1(config)# system aaa server-groups server-group ldap-group servers server ldap.company.com -
Commit the configuration changes.
commit
-
LDAP/AD authentication for users is configured on the system. When a user logs in, the system attempts to authenticate them against the configured authentication method. When the account has a match within any of the configured authentication methods, the user is authenticated and given access.
You can add the LDAP certificates and key from the CLI.
-
Log in to the command line interface (CLI) of the system using an account with admin access.
When you log in to the system, you are in user (operational) mode.
-
Change to config mode.
configThe CLI prompt changes to include
(config). -
Add the TLS config key:
system aaa tls config key (<*AES-encrypted-string*>)Press Enter to enable multi-line mode and paste the contents. Press Ctrl-D to exit multi-line mode.
A summary similar to this example displays:
appliance-1(config)# system aaa tls config key (<AES encrypted string>): [Multiline mode, exit with ctrl-D.] > -----BEGIN PRIVATE KEY----- > MIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQDarxbhnYlm8DoQ > W23fxEm6qZF5+DEBinym3IAZe7V3eV/v1UmuqSMKmz3pLX5oYTZ0Fqj+mW4XdMxK > kW93w91xYLZoOOn/P9ELt4Cu9YIoDTy3OU68EETjQarw9wd+0/JqKTRPWa+VAWGn > hMg6N2OCY7hNc8FWFU2YD2x6MryacVCgCi20uhzde2G89pJlqGrm9KpbCN1ZV4Hc > 4OWEnMAO/yyb8FceKQNgJ0pk9+kBosKfyYypZ8SjP9Bg4E76of5xMHBtbXNu/f3Y > hJk/0gmMyuoTKl5d9AAUhU+gOZP6z2GTc2UfWnG0dfG6SWUGVmBtZ8u8y3nPi7Y9 > G1K5R3TzAgMBAAECggEAVamQhQB4+mHP3OhzudviJcSWv/iA+eGNwq9NXq4e/5YE > Bqa+HjUTDOyS6+xuP+UUt5TIzjK79WRDQlKGH5wR+n+v9FOXFe2hrb1MIzz4p0fI > KN3CAdk9oufuVkXuIbhUlVFetFalePD5l+1joapgyIrXfz+A1H+zzYT9MUD+sGBJ > bYkTqxFgAwsJoMaPruemfzFLHeWRDh/o0fG7aA6v4AA+urIaK13bEs+U/38A6D4X > j+Mzr2RP4bQJHBKE5vYJ0bwqfO3we21CPYpkla4APJUNGOLuZwfGhH1QREQy31rA > sIru7KRBcxYikvfKI4oL8aUfPurcZbnaCD1bdUhlQQKBgQD3lQ4Qp53c3QGww/bQ > s0tvJD6T86t5ve47j0V6hKHbp8Kq/zm+3jkRVNjH8nipyleQ44YJuSqPfo4EVKLC > OYPDEEQP+2fAWmt1LUugoB/ilQHOHMJVuPUj9Hyt7wetp1EeFZqNqpgohdP9eM5/ > R8jSIuNhqIjPKTliqwOn4hLnvwKBgQDiHoE/O87/GadvmS/G6ExWFAE2j7l16y1f > pz/cqY/p674TF/VUYsyKaLKM08iOhT6XeDACto+z7TYd5YNYAgawuxcDvDWXOZxe > mWLpdzlQGzumeTz2Rsx3U3NnXETlGBWEjj6kAUq4oqFrRSBNGbHb4D7XVNuQPPSX > rZ8CfNxfzQKBgG/rZ7JLs2c2WR9JVve9NWqGnetQCcI9A8bU23mpH2omii+2tKn9 > 1xpomp64k6ddmvwafmtC02SOtzBp+jGGwnOZlMsMwTgJJ+6OjVONTxykc25zPb52 > oAqi6QHPvk7YBiltZrKH3cTjypMY23BaSQQFVXi+MSpE3nYmDL8FyboNAoGAVIDp > 9GO5nAROWpp5DHDL9m9LdMSJntPhBRpP93s22UjMo/4UJRE3N5KhB5guH3UUSy8T > YjAvzCIeU1Xum/lF3s5Mb4zqyjUxhvjzyiRQOuuygyhT7AXRa9a4DiyhYqx5fixa > pJgHALFmedw/khDEM1O+qGKCG4lsLzMndZqMERECgYEA5LQ128pxYmpp3lyK6a62 > 01W/1/BtuiApuEFdcqwk6MTtateS5Kpb5uA9orWISmtd7mZLcXZGTBuJEoWsHBs4 > BE/B1urijsnmFzGRwmwF9DwhhDuyLW/cAqQSWAb4IBkU0lo0MOwm80EgcLwoy/53 > zicLAzdPQOiNQEyIh5U46xg= > -----END PRIVATE KEY----- -
Add the TLS config certificate:
system aaa tls config certificate (<*string*>)Press Enter to enable multi-line mode and paste the contents. Press Ctrl-D to exit multi-line mode.
In this example, you add a certificate:
appliance-1(config)# system aaa tls config certificate (<string>): [Multiline mode, exit with ctrl-D.] > -----BEGIN CERTIFICATE----- > MIIESzCCAzOgAwIBAgIJALgGgs+5qgX1MA0GCSqGSIb3DQEBCwUAMIG7MQswCQYD > VQQGEwItLTESMBAGA1UECAwJU29tZVN0YXRlMREwDwYDVQQHDAhTb21lQ2l0eTEZ > MBcGA1UECgwQU29tZU9yZ2FuaXphdGlvbjEfMB0GA1UECwwWU29tZU9yZ2FuaXph > dGlvbmFsVW5pdDEeMBwGA1UEAwwVbG9jYWxob3N0LmxvY2FsZG9tYWluMSkwJwYJ > KoZIhvcNAQkBFhpyb290QGxvY2FsaG9zdC5sb2NhbGRvbWFpbjAeFw0yMDEwMjMy > MjMwNTZaFw0yMTEwMjMyMjMwNTZaMIG7MQswCQYDVQQGEwItLTESMBAGA1UECAwJ > U29tZVN0YXRlMREwDwYDVQQHDAhTb21lQ2l0eTEZMBcGA1UECgwQU29tZU9yZ2Fu > aXphdGlvbjEfMB0GA1UECwwWU29tZU9yZ2FuaXphdGlvbmFsVW5pdDEeMBwGA1UE > AwwVbG9jYWxob3N0LmxvY2FsZG9tYWluMSkwJwYJKoZIhvcNAQkBFhpyb290QGxv > Y2FsaG9zdC5sb2NhbGRvbWFpbjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC > ggEBANqvFuGdiWbwOhBbbd/ESbqpkXn4MQGKfKbcgBl7tXd5X+/VSa6pIwqbPekt > fmhhNnQWqP6Zbhd0zEqRb3fD3XFgtmg46f8/0Qu3gK71gigNPLc5TrwQRONBqvD3 > B37T8mopNE9Zr5UBYaeEyDo3Y4JjuE1zwVYVTZgPbHoyvJpxUKAKLbS6HN17Ybz2 > kmWoaub0qlsI3VlXgdzg5YScwA7/LJvwVx4pA2AnSmT36QGiwp/JjKlnxKM/0GDg > Tvqh/nEwcG1tc279/diEmT/SCYzK6hMqXl30ABSFT6A5k/rPYZNzZR9acbR18bpJ > ZQZWYG1ny7zLec+Ltj0bUrlHdPMCAwEAAaNQME4wHQYDVR0OBBYEFJ8f90ExRYYD > 0j2rQSKhMbRaKz0vMB8GA1UdIwQYMBaAFJ8f90ExRYYD0j2rQSKhMbRaKz0vMAwG > A1UdEwQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEBACzFSIiJ01qLtl9Nom5rtFRh > m+iH0RewmO2YV9rQTl53shma1/Wa2D5PXsFt6w0wiXRa6Gab1YVxaHkP9E4RK6us > B5s5pR+SijP02Ijw5y4RICegkWApx86wlW09NDBgPFQdz+xQnpx8LfAFDzkAEf02 > eI4SI25Vi3fDW6qeOKeQmS5itcRFXBi/E2+FwYu3zvtMEIp7WB90f0mvxiEd1bz8 > UY0pODHlYUzc/4jl9CGWGPl+80KHsjppqwsFzZs3koe2IyKbzMKfpdQ+oIiJP17+ > IVJgNbRCO5TgGXtFW3p3CJ2fHzEPongFdvbPOTr/cE/KkGxKqcoeN7d22g7POas= > -----END CERTIFICATE----- -
Commit the configuration changes.
commit
You can configure the rSeries system to use a RADIUS server for authenticating rSeries system user accounts.
Important: Before you begin, you must verify that the RADIUS service is set up on a server that is accessible to the rSeries system. The default port for RADIUS service is 1812. If the service is configured with a different port, make note of it, as you will need it during the configuration.
- Assign users to valid system group IDs on the external RADIUS server. For more information, see Group IDs (GIDs) and system authentication roles.
When configuring remote RADIUS authentication for the F5 system, you add these F5OS vendor-specific attributes (VSA) to the F5 vendor-specific RADIUS dictionary file on the RADIUS server.
ATTRIBUTE F5-F5OS-UID 21 integer
ATTRIBUTE F5-F5OS-GID 22 integer
ATTRIBUTE F5-F5OS-HOMEDIR 23 string
ATTRIBUTE F5-F5OS-SHELL 24 string
ATTRIBUTE F5-F5OS-USERINFO 25 stringYou can configure the use of RADIUS authentication with rSeries systems from the webUI.
-
Log in to the webUI using an account with admin access.
-
On the left, click USER MANAGEMENT > Authentication Settings.
-
To enable an external authentication server, in Authentication Methods, select RADIUS.
The RADIUS server must be configured and reachable from the system.
Note: By default, local authentication is always enabled, so an administrator can access the system in case of external authentication server failure.
-
Click Save.
RADIUS authentication for users is configured on the system. When a user logs in, the system attempts to authenticate them against the configured authentication method. When the account has a match within any of the configured authentication methods, the user is authenticated and given access.
Next, you can create a server group.
You can configure a RADIUS server group from the webUI.
-
Log in to the webUI using an account with admin access.
-
On the left, click USER MANAGEMENT > Server Groups.
-
Click Add.
-
For Name, create a recognizable name for the server group.
-
For Provider Type, select RADIUS to qualify the type of servers that will be in the group.
-
Click Save & Close.
-
Click the server group to which you want to add servers.
The Edit Server Group screen displays.
-
Click Add.
-
For Server, enter the IPv4, IPv6 address, or FQDN of the RADIUS server to add.
-
For Port, make sure the port number is correct for RADIUS traffic.
The default value is 1812.
-
For Secret, enter the shared secret used to access the server.
-
For Timeout (seconds), type the number of seconds to timeout if unable to access the server.
The default value is 5.
-
Click Save & Close.
Add as many servers as needed to the group.
You can configure the system for RADIUS authentication from the CLI. You can also create a RADIUS server group, if you have multiple external RADIUS servers to which you want to connect.
-
Log in to the command line interface (CLI) of the system using an account with admin access.
When you log in to the system, you are in user (operational) mode.
-
Change to config mode.
configThe CLI prompt changes to include
(config). -
Set the authentication method to RADIUS.
system aaa authentication config authentication-method RADIUS_ALL -
Commit the configuration changes.
commit -
Add the RADIUS service details to the authentication server groups:
-
Create a server group.
system aaa server-groups server-group <*group-name*> config name <*group-name*> type RADIUSThis example creates an RADIUS server group named radius-group:
appliance-1(config)# system aaa server-groups server-group radius-group config name radius-group type RADIUS -
Add a server to the server group.
servers server <*ip-address*> config address <*ip-address*>This example adds a server at specified IP address:
appliance-1(config-server-group-radius-group)# servers server 192.0.2.20 -
Customize other RADIUS configuration details, as needed.
radius config auth-port <*port-number*> secret-key <*secret*> timeout <*timeout-in-seconds*>This example shows configuring a port number:
appliance-1(config-server-192.0.2.20)# radius config port 1812 -
Commit the configuration changes.
commit
-
RADIUS authentication for users is configured on the system. When a user logs in, the system attempts to authenticate them against the configured authentication method. When the account has a match within any of the configured authentication methods, the user is authenticated and given access.
You can configure the rSeries system to use a TACACS+ server for authenticating rSeries system user accounts.
Before you begin:
- Verify that TACACS+ is set up on a server that is accessible to the rSeries system.
- Assign users to valid system group IDs on the external TACACS+ server. For more information, see Group IDs (GIDs) and system authentication roles.
You can configure the use of TACACS+ authentication with rSeries systems from the webUI.
-
Log in to the webUI using an account with admin access.
-
On the left, click USER MANAGEMENT > Authentication Settings.
-
To enable an external authentication server, in Authentication Methods, select TACACS+.
The TACACS+ server must be configured and reachable from the system.
Note: By default, local authentication is always enabled, so an administrator can access the system in case of external authentication server failure.
-
Click Save.
TACACS+ authentication for users is configured on the system. When a user logs in, the system attempts to authenticate them against the configured authentication method. When the account has a match within any of the configured authentication methods, the user is authenticated and given access.
Next, you can create a server group.
You can configure a TACACS+ server group from the webUI.
-
Log in to the webUI using an account with admin access.
-
On the left, click USER MANAGEMENT > Server Groups.
-
Click Add.
-
For Name, create a recognizable name for the server group.
-
For Provider Type, select TACACS+ to qualify the type of servers that will be in the group.
-
Click Save & Close.
-
Click the server group to which you want to add servers.
The Edit Server Group screen displays.
-
Click Add.
-
For Server, type the IPv4, IPv6 address, or FQDN of the TACACS+ server to add.
-
For Port, make sure the port number is correct for TACACS+ traffic.
The default value is 49.
-
For Secret, enter the shared secret used to access the server.
-
Click Save & Close.
Add as many servers as needed to the group.
You can configure TACACS+ authentication from the CLI.
-
Log in to the command line interface (CLI) of the system using an account with admin access.
When you log in to the system, you are in user (operational) mode.
-
Change to config mode.
configThe CLI prompt changes to include
(config). -
Set the authentication method to TACACS+.
system aaa authentication config authentication-method TACACS_ALL -
Commit the configuration changes.
commit -
Add the TACACS+ service details to the authentication server groups.
-
Create a server group.
system aaa server-groups server-group <*group-name*> config name <*group-name*> type TACACSThis example creates a TACACS+ server group named tacacs-group:
appliance-1(config)# system aaa server-groups server-group tacacs-group config name tacacs-group type TACACS -
Add a server to the server group.
servers server <*ip-address*> config address <*ip-address*>This example adds a server at specified IP address:
appliance-1(config-server-group-tacacs-group)# servers server 192.0.2.22 -
Customize other TACACS+ configuration details, as needed.
tacacs config port <*port-number*> secret-key <*secret*> source-address <*ip-address*>This example shows configuring a port number:
appliance-1(config-server-192.0.2.22)# tacacs config port 49 -
Commit the configuration changes.
commit
-
TACACS+ authentication for users is configured on the system. When a user logs in, the system attempts to authenticate them against the configured authentication method. When the account has a match within any of the configured authentication methods, the user is authenticated and given access.
Admin users can configure the rSeries system to use Online Certificate Status Protocol (OCSP) to verify certificate validity and revoke expired certificates. The system sends an OCSP request, which includes the certificate serial number, to an OCSP responder, and receives a response with the certificate status (good, revoked, or unknown). OCSP is a similar to CRL checking, and you can configure the system to use both at the same time.
You can configure Online Certificate Status Protocol (OCSP) for certificate validation from the CLI.
-
Log in to the command line interface (CLI) of the system using an account with admin access.
When you log in to the system, you are in user (operational) mode.
-
Change to config mode.
configThe CLI prompt changes to include
(config). -
Enable OCSP.
system aaa authentication ocsp config enabled -
Configure the OCSP responder address that will be used for client certificate validation using one of these methods:
-
Provide the OCSP responder address using the client certificate.
appliance-1(config)# system aaa authentication ocsp config override-responder off -
Provide the OCSP IP address using a server group.
appliance-1(config)# system aaa authentication ocsp config override-responder on appliance-1(config)# system aaa server-groups server-group ocsp1 config name ocsp1 type OCSP appliance-1(config-server-group-ocsp1)# servers server 192.0.2.10 appliance-1(config-server-192.0.2.10)# config address 192.0.2.10 appliance-1(config-server-192.0.2.10)# ocsp config port 23456
-
-
Configure additional OCSP options, if needed.
The system creates the responder address using default values for
nonce-request(on) andresponse-time-skew(300).system aaa authentication ocsp config nonce-request { off | on } response-max-age <*time-in-seconds*> response-time-skew <*time-in-seconds*>For
nonce-request, the default value ison. Forresponse-max-age, the default value is-1, which disables the maximum age check. The range is from -1 to 214748364. Forresponse-time skew, the default value is300. -
Commit the configuration changes.
commit
You can configure an Online Certificate Status Protocol (OCSP) server group from the CLI. The server group can contain only one OCSP server.
-
Log in to the command line interface (CLI) of the system using an account with admin access.
When you log in to the system, you are in user (operational) mode.
-
Change to config mode.
configThe CLI prompt changes to include
(config). -
Create an OCSP server group.
system aaa server-groups server-group <*group-name*> config name <*group-name*> type OCSPThis example creates an OCSP server group named ocsp-group:
appliance-1(config)# system aaa server-groups server-group ocsp-group config type OCSP -
Add an OCSP server to the server group.
servers server <*ip-address*> config address <*ip-address*>This example adds a server at a specified IP address, with the default value for port number (
80):appliance-1(config-server-group-ocsp-group)# servers server 192.0.2.25 ocsp config port 88 -
Commit the configuration changes.
commit
Using SSH public key authentication to connect to a remote system is a robust, more secure alternative to logging in with an account password or passphrase. SSH public key authentication relies on asymmetric cryptographic algorithms that generate a pair of separate keys (a key pair), one “private” and the other “public”. You keep the private key a secret and store it on the computer you use to connect to the remote system.
You can configure Secure Shell (SSH) public key authentication from the CLI. You can configure multiple authorized keys in one step. This feature supports all SSH key algorithms that are supported in the latest SSHD version. Root users cannot use this feature.
-
Log in to the command line interface (CLI) of the system using an account with admin access.
When you log in to the system, you are in user (operational) mode.
-
Change to config mode.
configThe CLI prompt changes to include
(config). -
Configure the SSH public key authentication.
system aaa authentication users user <*username*> config authorized_keysPress Enter to enable multi-line mode and paste the contents. Paste the first SSH public key into the prompt, hit enter to paste the next key, and continue until you have entered all keys. Press Ctrl-D to exit multi-line mode.
In this example, you configure public key authentication for a specified user:
appliance-1(config)# system aaa authentication users user jdoe config authorized_keys (<string, min: 1 chars>): [Multiline mode, exit with ctrl-D.] > hdsjhfashlksdfklahkjdhsakfdhaskhfkjasdhfjashd -
Commit the configuration changes.
commit -
Remove the authorized key.
no system aaa authentication users user <*username*> config authorized_keys -
Commit the configuration changes.
commit
A password policy enables you to qualify criteria for valid passwords and configure maximum password attempts for local authentication (/etc/passwd).
-
Log in to the webUI using an account with admin access.
-
On the left, click USER MANAGEMENT > Authentication Settings.
-
In the Local Password Policy area, for Minimum Length, type the minimum number of characters required for a password.
The allowed range is 6 to 255.
-
For Required Characters, enter the minimum number of Numeric, Uppercase, Lowercase, and Special characters required in a valid password.
-
For New/Old Password Differential, enter the number of character changes in the new password that differentiate it from the old password.
The default value is 8.
-
For Disallow Username, select whether to check the password for the user name in forward or reversed form.
When set to True, if any variant of the username is found in the password, the new password is rejected.
-
Set Apply Password Policy to Root Account to True to use the same password policy for the root account.
The default value is False.
-
For Maximum Password Retries, enter the number of times a user can try to create an acceptable password at the prompt.
The default value is 3.
-
For Maximum Login Attempts, enter the allowed number of times a user can attempt to log in before the account is temporarily suspended.
The default value is 10 tries. If set to 0, there is no limit to the number of login attempts.
-
For Lockout Duration, type the amount of time in minutes that must lapse before a previously suspended user’s account is unlocked.
The default auto value is 1 minute. If the value is set to 0, the administrator will have to manually unlock the user’s account.
-
For Max Password Age, type the maximum number of days the password will expire after being changed.
If the last change was today and Maximum Password Age is 90, then the password will expire in 91 days. If set to 0 (the default), the password never expires.
-
Click Save.
You have configured the local password policy. On the same screen, you can configure other authentication settings.
You can add users to the rSeries system from the webUI. Default root and admin accounts are provided on the system. You can change the passwords on those accounts, but they cannot be deleted.
Note: You can create only admin and operator users from the webUI. You can create other roles from the CLI.
-
Log in to the webUI using an account with admin access.
-
On the left, click USER MANAGEMENT > Users.
-
Click Add.
-
For Username, create a name for the user.
-
For Set Password, create a valid password according to the local password policy defined in the Authentication Settings.
-
For Confirm Password, retype the password.
-
From the Role list, select the role to assign appropriate capabilities for the user.
Option
Description
Admin
Used for the system administrator. Provides access to the CLI or webUI to configure the system (unrestricted read/write access). Can unlock any users.
Resource Admin
Similar to the Admin user role, but cannot create, modify, or delete local user accounts; create, modify, or delete server groups; or modify any authentication settings. This user role can modify their own user detail to change their own password.
Operator
Provides read access to system. Has write access to change password only.
-
Click Save & Close.
Create as many users as needed to manage the system.
You can configure basic authentication (user name and password) from the webUI.
-
Log in to the webUI using an account with admin access.
-
On the left, click USER MANAGEMENT > Authentication Settings.
-
For Basic Authentication, select whether to enable authenticating using a username and password.
The default value is Enabled.
-
Click Save.
You can choose how long your webUI session will remain active (in minutes) by configuring the token lifetime from the webUI.
-
Log in to the webUI using an account with admin access.
-
On the left, click USER MANAGEMENT > Authentication Settings.
-
For Token Lifetime, enter the token lifetime length in minutes.
The range is from 1 to 1440 minutes. The default value is 15.
-
Click Save.
You can create additional users on your system from the CLI.
-
Log in to the command line interface (CLI) of the system using an account with admin access.
When you log in to the system, you are in user (operational) mode.
-
Change to config mode.
configThe CLI prompt changes to include
(config). -
Add a user.
system aaa authentication users user <*user-name*> config username <*user-name*> role <*role*> expiry-date <*yyyy-mm-dd*>Where expiry-date is the date <yyyy-mm-dd> you want the account to expire. Some other values for expiry-date are -1 for no expiration date (the default value), and 1 for expired.
This example creates an admin user named testuser with an account expiration date of November 20, 2025:
appliance-1(config)# system aaa authentication users user testuser config username test role admin expiry-date 2023-11-20Note: The dates specified in the example use local time. However, the operating system uses midnight UTC on the specified date, not the local time shown.
These roles are available:
Role
Description
admin
Has full read/write access and can make configuration changes at the level in which they are working.
limited
F5 internal use only
operator
Has read-only access to every screen and every configuration object at the level in which they are working.
resource-admin
Similar to the Admin user role, but cannot create, modify, or delete local user accounts; create, modify, or delete server groups; or modify any authentication settings. This user role can modify their own user detail to change their own password.
tenant console
Has virtual console access to tenants from the CLI but no access to the rSeries system.
-
Commit the configuration changes.
commit
The system creates the account with the specified role.
You can disable user accounts on your system from the CLI.
-
Log in to the command line interface (CLI) of the system using an account with admin access.
When you log in to the system, you are in user (operational) mode.
-
Change to config mode.
configThe CLI prompt changes to include
(config). -
Disable a user.
An expiry-date of 1 disables the account immediately.
system aaa authentication users user <*user-name*> config expiry-date 1This example disables a user named testuser:
appliance-1(config)# system aaa authentication users user testuser config expiry-date 1Note: The dates specified in the example use local time. However, the operating system uses midnight UTC on the specified date, not the local time shown.
-
Commit the configuration changes.
commit
You can delete a specified user from the CLI.
-
Log in to the command line interface (CLI) of the system using an account with admin access.
When you log in to the system, you are in user (operational) mode.
-
Change to config mode.
configThe CLI prompt changes to include
(config). -
Delete a user.
no system aaa authentication users user <*user-name*>This example deletes a user named testuser:
appliance-1(config)# no system aaa authentication users user testuser -
Commit the configuration changes.
commit
You can set an admin user’s password from the CLI.
-
Log in to the command line interface (CLI) of the system using an account with admin access.
When you log in to the system, you are in user (operational) mode.
-
Change to config mode.
configThe CLI prompt changes to include
(config). -
Set a password for an admin user.
system aaa authentication users user <*user-name*> config set-passwordThis example sets the password for an admin user named testadmin:
appliance-1(config)# system aaa authentication users user testadmin config set-passwordThe system prompts you to set a new password for the specified admin user.
-
Commit the configuration changes.
commit
You can globally set the maximum password age for all users from the CLI. To do this, you specify the number of days after which the password will expire since it was last changed. For example, if the last change was today and the maximum age is 1, the password will expire tomorrow.
-
Log in to the command line interface (CLI) of the system using an account with admin access.
When you log in to the system, you are in user (operational) mode.
-
Change to config mode.
configThe CLI prompt changes to include
(config). -
Specify the number of days after which a password will expire since it was last changed.
system aaa password-policy config max-age <*number-of-days*>In this example, you set the number of days to 14:
appliance-1(config)# system aaa password-policy config max-age 14 -
Commit the configuration changes.
commit
When you log in to the CLI, you receive a message that the password will expire in the specified number of days.
appliance-1# ssh admin@localhostadmin@localhost's password: Warning: your password will expire in 1 day
Last login: Wed Jan 18 05:56:21 2020 from ::1Note: The dates specified in the example use local time. However, the operating system uses midnight UTC on the specified date, not the local time shown.
You can change the password for a specified user from the CLI.
-
Log in to the command line interface (CLI) of the system using an account with admin access.
When you log in to the system, you are in user (operational) mode.
-
Change to config mode.
configThe CLI prompt changes to include
(config). -
Change a specified user’s password.
system aaa authentication users user <*user-name*> config change-passwordThis example changes the password for a user named testuser:
appliance-1(config)# system aaa authentication users user testuser config change-passwordThe system prompts you to confirm the old password, set a new password, and confirm the new password for the specified user.
-
Commit the configuration changes.
commit
You can modify or set options for a specified user from the CLI.
-
Log in to the command line interface (CLI) of the system using an account with admin access.
When you log in to the system, you are in user (operational) mode.
-
Change to config mode.
configThe CLI prompt changes to include
(config). -
Change user options for a user.
system aaa authentication users user <*user-name*> config last-change <*time*> expiry-date <*yyyy-mm-dd*>This example sets a last change date of zero (0) and an expiration date of January 1, 2030 for an admin user named testuser:
appliance-1(config)# system aaa authentication users user testuser config last-change 0 expiry-date 2030-01-01Note: The dates specified in the example use local time. However, the operating system uses midnight UTC on the specified date, not the local time shown.
-
Commit the configuration changes.
commit
You can configure basic authentication (that is, logging in to the system using a username and password) from the CLI.
-
Log in to the command line interface (CLI) of the system using an account with admin access.
When you log in to the system, you are in user (operational) mode.
-
Change to config mode.
configThe CLI prompt changes to include
(config). -
Configure basic authentication.
system aaa authentication config basic { disabled | enabled }This example enables basic authentication:
appliance-1(config)# system aaa authentication config basic enabled -
Commit the configuration changes.
commit
You can configure how long the CLI is inactive before you are logged out of the system. If you are connected using an SSH connection, the system closes the SSH connection after this time expires. You can also configure how long the system is inactive for a root user before the user is logged out of the system.
-
Log in to the command line interface (CLI) of the system using an account with admin access.
When you log in to the system, you are in user (operational) mode.
-
Change to config mode.
configThe CLI prompt changes to include
(config). -
Configure the CLI system idle timeout setting.
system settings config idle-timeout <*time-in-seconds*>A value of 0 (zero) sets the time to infinity, so the user is never logged out. The timeout can be a value from 0 through 8192 seconds. The default value is 1800 seconds (30 minutes).
This example sets an idle timeout of 3600 seconds (one hour):
appliance-1(config)# system settings config idle-timeout 3600 -
Configure the SSH system idle timeout setting for a root user.
system settings config sshd-idle-timeout <*time-in-seconds*>A value of 0 (zero) sets the time to infinity, so the user is never logged out. The timeout can be a value from 0 through 8192 seconds. The default value is 0 (zero).
This example sets an SSH system idle timeout of 3600 seconds (one hour):
appliance-1(config)# system settings config sshd-idle-timeout 3600 -
Commit the configuration changes.
commit