config system admin
Configure admin users.
config system admin
Description: Configure admin users.
edit <name>
set wildcard [enable|disable]
set remote-auth [enable|disable]
set remote-group {string}
set password {password-2}
set peer-auth [enable|disable]
set peer-group {string}
set trusthost1 {ipv4-classnet}
set trusthost2 {ipv4-classnet}
set trusthost3 {ipv4-classnet}
set trusthost4 {ipv4-classnet}
set trusthost5 {ipv4-classnet}
set trusthost6 {ipv4-classnet}
set trusthost7 {ipv4-classnet}
set trusthost8 {ipv4-classnet}
set trusthost9 {ipv4-classnet}
set trusthost10 {ipv4-classnet}
set ip6-trusthost1 {ipv6-prefix}
set ip6-trusthost2 {ipv6-prefix}
set ip6-trusthost3 {ipv6-prefix}
set ip6-trusthost4 {ipv6-prefix}
set ip6-trusthost5 {ipv6-prefix}
set ip6-trusthost6 {ipv6-prefix}
set ip6-trusthost7 {ipv6-prefix}
set ip6-trusthost8 {ipv6-prefix}
set ip6-trusthost9 {ipv6-prefix}
set ip6-trusthost10 {ipv6-prefix}
set accprofile {string}
set allow-remove-admin-session [enable|disable]
set comments {var-string}
set vdom <name1>, <name2>, ...
set ssh-public-key1 {user}
set ssh-public-key2 {user}
set ssh-public-key3 {user}
set ssh-certificate {string}
set schedule {string}
set accprofile-override [enable|disable]
set radius-vdom-override [enable|disable]
set password-expire {user}
set force-password-change [enable|disable]
set two-factor [disable|fortitoken|...]
set two-factor-authentication [fortitoken|email|...]
set two-factor-notification [email|sms]
set fortitoken {string}
set email-to {string}
set sms-server [fortiguard|custom]
set sms-custom-server {string}
set sms-phone {string}
set guest-auth [disable|enable]
set guest-usergroups <name1>, <name2>, ...
set guest-lang {string}
next
end
config system admin
Parameter |
Description |
Type |
Size |
|||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
wildcard |
Enable/disable wildcard RADIUS authentication. |
option |
- |
|||||||||||||
|
|
|||||||||||||||
remote-auth |
Enable/disable authentication using a remote RADIUS, LDAP, or TACACS+ server. |
option |
- |
|||||||||||||
|
|
|||||||||||||||
remote-group |
User group name used for remote auth. |
string |
Not Specified |
|||||||||||||
password |
Admin user password. |
password-2 |
Not Specified |
|||||||||||||
peer-auth |
Set to enable peer certificate authentication (for HTTPS admin access). |
option |
- |
|||||||||||||
|
|
|||||||||||||||
peer-group |
Name of peer group defined under config user group which has PKI members. Used for peer certificate authentication (for HTTPS admin access). |
string |
Not Specified |
|||||||||||||
trusthost1 |
Any IPv4 address or subnet address and netmask from which the administrator can connect to the FortiGate unit. Default allows access from any IPv4 address. |
ipv4-classnet |
Not Specified |
|||||||||||||
trusthost2 |
Any IPv4 address or subnet address and netmask from which the administrator can connect to the FortiGate unit. Default allows access from any IPv4 address. |
ipv4-classnet |
Not Specified |
|||||||||||||
trusthost3 |
Any IPv4 address or subnet address and netmask from which the administrator can connect to the FortiGate unit. Default allows access from any IPv4 address. |
ipv4-classnet |
Not Specified |
|||||||||||||
trusthost4 |
Any IPv4 address or subnet address and netmask from which the administrator can connect to the FortiGate unit. Default allows access from any IPv4 address. |
ipv4-classnet |
Not Specified |
|||||||||||||
trusthost5 |
Any IPv4 address or subnet address and netmask from which the administrator can connect to the FortiGate unit. Default allows access from any IPv4 address. |
ipv4-classnet |
Not Specified |
|||||||||||||
trusthost6 |
Any IPv4 address or subnet address and netmask from which the administrator can connect to the FortiGate unit. Default allows access from any IPv4 address. |
ipv4-classnet |
Not Specified |
|||||||||||||
trusthost7 |
Any IPv4 address or subnet address and netmask from which the administrator can connect to the FortiGate unit. Default allows access from any IPv4 address. |
ipv4-classnet |
Not Specified |
|||||||||||||
trusthost8 |
Any IPv4 address or subnet address and netmask from which the administrator can connect to the FortiGate unit. Default allows access from any IPv4 address. |
ipv4-classnet |
Not Specified |
|||||||||||||
trusthost9 |
Any IPv4 address or subnet address and netmask from which the administrator can connect to the FortiGate unit. Default allows access from any IPv4 address. |
ipv4-classnet |
Not Specified |
|||||||||||||
trusthost10 |
Any IPv4 address or subnet address and netmask from which the administrator can connect to the FortiGate unit. Default allows access from any IPv4 address. |
ipv4-classnet |
Not Specified |
|||||||||||||
ip6-trusthost1 |
Any IPv6 address from which the administrator can connect to the FortiGate unit. Default allows access from any IPv6 address. |
ipv6-prefix |
Not Specified |
|||||||||||||
ip6-trusthost2 |
Any IPv6 address from which the administrator can connect to the FortiGate unit. Default allows access from any IPv6 address. |
ipv6-prefix |
Not Specified |
|||||||||||||
ip6-trusthost3 |
Any IPv6 address from which the administrator can connect to the FortiGate unit. Default allows access from any IPv6 address. |
ipv6-prefix |
Not Specified |
|||||||||||||
ip6-trusthost4 |
Any IPv6 address from which the administrator can connect to the FortiGate unit. Default allows access from any IPv6 address. |
ipv6-prefix |
Not Specified |
|||||||||||||
ip6-trusthost5 |
Any IPv6 address from which the administrator can connect to the FortiGate unit. Default allows access from any IPv6 address. |
ipv6-prefix |
Not Specified |
|||||||||||||
ip6-trusthost6 |
Any IPv6 address from which the administrator can connect to the FortiGate unit. Default allows access from any IPv6 address. |
ipv6-prefix |
Not Specified |
|||||||||||||
ip6-trusthost7 |
Any IPv6 address from which the administrator can connect to the FortiGate unit. Default allows access from any IPv6 address. |
ipv6-prefix |
Not Specified |
|||||||||||||
ip6-trusthost8 |
Any IPv6 address from which the administrator can connect to the FortiGate unit. Default allows access from any IPv6 address. |
ipv6-prefix |
Not Specified |
|||||||||||||
ip6-trusthost9 |
Any IPv6 address from which the administrator can connect to the FortiGate unit. Default allows access from any IPv6 address. |
ipv6-prefix |
Not Specified |
|||||||||||||
ip6-trusthost10 |
Any IPv6 address from which the administrator can connect to the FortiGate unit. Default allows access from any IPv6 address. |
ipv6-prefix |
Not Specified |
|||||||||||||
accprofile |
Access profile for this administrator. Access profiles control administrator access to FortiGate features. |
string |
Not Specified |
|||||||||||||
allow-remove-admin-session |
Enable/disable allow admin session to be removed by privileged admin users. |
option |
- |
|||||||||||||
|
|
|||||||||||||||
comments |
Comment. |
var-string |
Not Specified |
|||||||||||||
vdom |
Virtual domain(s) that the administrator can access. Virtual domain name. |
string |
Maximum length: 79 |
|||||||||||||
ssh-public-key1 |
Public key of an SSH client. The client is authenticated without being asked for credentials. Create the public-private key pair in the SSH client application. |
user |
Not Specified |
|||||||||||||
ssh-public-key2 |
Public key of an SSH client. The client is authenticated without being asked for credentials. Create the public-private key pair in the SSH client application. |
user |
Not Specified |
|||||||||||||
ssh-public-key3 |
Public key of an SSH client. The client is authenticated without being asked for credentials. Create the public-private key pair in the SSH client application. |
user |
Not Specified |
|||||||||||||
ssh-certificate |
Select the certificate to be used by the FortiGate for authentication with an SSH client. |
string |
Not Specified |
|||||||||||||
schedule |
Firewall schedule used to restrict when the administrator can log in. No schedule means no restrictions. |
string |
Not Specified |
|||||||||||||
accprofile-override |
Enable to use the name of an access profile provided by the remote authentication server to control the FortiGate features that this administrator can access. |
option |
- |
|||||||||||||
|
|
|||||||||||||||
radius-vdom-override |
Enable to use the names of VDOMs provided by the remote authentication server to control the VDOMs that this administrator can access. |
option |
- |
|||||||||||||
|
|
|||||||||||||||
password-expire |
Password expire time. |
user |
Not Specified |
|||||||||||||
force-password-change |
Enable/disable force password change on next login. |
option |
- |
|||||||||||||
|
|
|||||||||||||||
two-factor |
Enable/disable two-factor authentication. |
option |
- |
|||||||||||||
|
|
|||||||||||||||
two-factor-authentication |
Authentication method by FortiToken Cloud. |
option |
- |
|||||||||||||
|
|
|||||||||||||||
two-factor-notification |
Notification method for user activation by FortiToken Cloud. |
option |
- |
|||||||||||||
|
|
|||||||||||||||
fortitoken |
This administrator's FortiToken serial number. |
string |
Not Specified |
|||||||||||||
email-to |
This administrator's email address. |
string |
Not Specified |
|||||||||||||
sms-server |
Send SMS messages using the FortiGuard SMS server or a custom server. |
option |
- |
|||||||||||||
|
|
|||||||||||||||
sms-custom-server |
Custom SMS server to send SMS messages to. |
string |
Not Specified |
|||||||||||||
sms-phone |
Phone number on which the administrator receives SMS messages. |
string |
Not Specified |
|||||||||||||
guest-auth |
Enable/disable guest authentication. |
option |
- |
|||||||||||||
|
|
|||||||||||||||
guest-usergroups |
Select guest user groups. Select guest user groups. |
string |
Maximum length: 79 |
|||||||||||||
guest-lang |
Guest management portal language. |
string |
Not Specified |