MikroTik Certified Internetworking Engineer (MTCINE)
1 Introduction to Networking
1-1 Basic Networking Concepts
1-2 OSI Model
1-3 TCPIP Model
1-4 Network Devices
1-5 Network Topologies
2 MikroTik RouterOS Basics
2-1 Introduction to RouterOS
2-2 RouterOS Interface
2-3 Basic Configuration
2-4 User Management
2-5 System Logging
3 IP Addressing and Subnetting
3-1 IPv4 Addressing
3-2 Subnetting
3-3 IPv6 Addressing
3-4 IPv6 Subnetting
3-5 NAT and PAT
4 Routing
4-1 Static Routing
4-2 Dynamic Routing Protocols
4-3 OSPF
4-4 BGP
4-5 EIGRP
5 Wireless Networking
5-1 Wireless Basics
5-2 Wireless Security
5-3 Wireless Configuration
5-4 Wireless Bridging
5-5 Wireless Repeaters
6 VPN Technologies
6-1 VPN Basics
6-2 IPsec VPN
6-3 OpenVPN
6-4 L2TPPPTP
6-5 SSL VPN
7 Quality of Service (QoS)
7-1 QoS Basics
7-2 Traffic Shaping
7-3 Policing
7-4 Prioritization
7-5 Queue Types
8 Firewall and Security
8-1 Firewall Basics
8-2 Firewall Rules
8-3 NAT Rules
8-4 Filtering Rules
8-5 Hotspot and Captive Portal
9 Advanced Topics
9-1 VLANs
9-2 MPLS
9-3 High Availability
9-4 Load Balancing
9-5 Monitoring and Troubleshooting
2.4 User Management Explained

2.4 User Management Explained

Key Concepts in User Management

User Management is a critical aspect of network administration, ensuring that only authorized users can access network resources. Key concepts include user creation, authentication, authorization, and user roles.

1. User Creation

User creation involves adding new users to the network. This process typically includes specifying a username, password, and other relevant details. Proper user creation ensures that each user has a unique identity within the network.

Example: When onboarding a new employee, the network administrator creates a user account with a unique username and a secure password. This account allows the employee to access necessary network resources.

2. Authentication

Authentication is the process of verifying the identity of a user. Common methods include password-based authentication, multi-factor authentication (MFA), and biometric authentication. Authentication ensures that only legitimate users can access the network.

Example: When logging into a corporate network, a user must enter a username and password. If MFA is enabled, the user might also need to provide a one-time code sent to their mobile device to complete the login process.

3. Authorization

Authorization determines what actions a user is permitted to perform once authenticated. This involves setting permissions and access levels for users. Proper authorization ensures that users can only access resources relevant to their roles.

Example: An IT administrator might have full access to all network resources, while a regular employee might only have access to email and shared drives. Authorization rules ensure that each user can only perform tasks within their designated scope.

4. User Roles

User roles define the set of permissions and responsibilities assigned to a user. Common roles include administrator, user, guest, and various custom roles. Assigning roles simplifies user management by grouping users with similar access needs.

Example: In a school network, teachers might be assigned a "Teacher" role with access to grade books and lesson plans, while students are assigned a "Student" role with access to educational resources but not administrative tools.

Conclusion

Effective user management is essential for maintaining network security and efficiency. By understanding and implementing user creation, authentication, authorization, and user roles, network administrators can ensure that only authorized users have access to network resources, thereby protecting sensitive data and maintaining network integrity.