MikroTik Certified User Management Engineer (MTCUME)
1 Introduction to MikroTik
1-1 Overview of MikroTik products
1-2 MikroTik RouterOS basics
1-3 MikroTik hardware overview
1-4 MikroTik software overview
2 User Management Fundamentals
2-1 Understanding user roles and permissions
2-2 Creating and managing users
2-3 User groups and their usage
2-4 Password policies and security
3 Advanced User Management
3-1 Implementing role-based access control (RBAC)
3-2 Customizing user profiles
3-3 User authentication methods
3-4 Integrating external authentication sources
4 User Access Control
4-1 Configuring access lists (ACLs)
4-2 Managing user access to resources
4-3 Time-based access control
4-4 Monitoring and logging user activities
5 User Management in Network Services
5-1 User management in DHCP
5-2 User management in VPN
5-3 User management in firewall
5-4 User management in hotspot
6 User Management in Cloud
6-1 Introduction to MikroTik Cloud
6-2 Managing users in MikroTik Cloud
6-3 Integrating Cloud services with user management
6-4 Security considerations in Cloud user management
7 Troubleshooting User Management
7-1 Common user management issues
7-2 Debugging user authentication problems
7-3 Resolving access control issues
7-4 Performance optimization in user management
8 Best Practices and Compliance
8-1 Best practices in user management
8-2 Compliance with industry standards
8-3 Auditing user management configurations
8-4 Continuous improvement in user management
User Authentication Methods

User Authentication Methods

User authentication is a critical aspect of network security, ensuring that only authorized users can access network resources. MikroTik RouterOS supports several authentication methods, each with its own strengths and use cases. This webpage will delve into three key authentication methods: Local Authentication, RADIUS Authentication, and LDAP Authentication.

1. Local Authentication

Local authentication is the simplest form of user authentication, where user credentials are stored directly on the MikroTik device. This method is ideal for small networks with a limited number of users. Local authentication is managed through the RouterOS user manager, allowing administrators to create, modify, and delete user accounts.

Imagine a small office where the network administrator manages all user accounts directly on the router. Just as the administrator knows everyone in the office, the router knows all local users and their credentials.

Example: To create a local user named "admin" with a password "P@ssw0rd123", you would use the following command:

        /user add name=admin password=P@ssw0rd123 group=full
    

2. RADIUS Authentication

RADIUS (Remote Authentication Dial-In User Service) is a network protocol that provides centralized authentication, authorization, and accounting (AAA) management for users who connect and use a network service. RADIUS authentication is commonly used in larger networks where centralized user management is required.

Think of RADIUS as a security guard at a large office building. Just as the guard checks everyone's credentials before allowing them in, RADIUS checks user credentials against a central database before granting access to the network.

Example: To configure RADIUS authentication on a MikroTik device, you would set up a RADIUS server and configure the router to use it. Here’s a basic configuration:

        /radius add service=login address=192.168.1.10 secret=radiussecret
        /ip radius set enabled=yes
    

3. LDAP Authentication

LDAP (Lightweight Directory Access Protocol) is a protocol used to access and maintain distributed directory information services over an IP network. LDAP authentication allows MikroTik devices to authenticate users against an LDAP directory, such as Microsoft Active Directory. This method is useful in environments where user accounts are managed centrally.

Consider LDAP as a large, organized phonebook. Just as you look up a person's contact information in a phonebook, LDAP allows the router to look up user credentials in a central directory.

Example: To configure LDAP authentication on a MikroTik device, you would specify the LDAP server details and bind credentials. Here’s a basic configuration:

        /ipldap add address=192.168.1.20 base-dn="DC=example,DC=com" user="ldapuser" password="ldappassword"
        /ipldap set enabled=yes
    

By understanding and implementing these authentication methods, you can ensure secure and efficient user management in your MikroTik network. Each method offers unique advantages, making them suitable for different network environments and requirements.