Access / User Management¶
The user manager of OPNsense allows for controlling access to the different part (pages) of the configurator as well as controlling access to particular services on a per user bases.
OPNsense offers integration with external servers for services that require user authentication. These services include:
Integrated into OPNsense are the Local User Database and Voucher Server. The Voucher Server is intended to be used with the Captive portal.
External services currently supported are:
LDAP (OpenLDAP, MS Active Directory, Novell eDirectory)
Users, Groups & Privileges¶
When using the local user manager, either stand alone or on combination with an external authentication server one can define groups to combine a set of privileges for a specific user group. A user should be an individual, a group needs to be specific in such a way that anyone of that group can be granted the same access rights, called privileges.
Authentication services can be configured using the settings in. This includes both local accounts and remote authentication.
By default, OPNsense GUI login will use local accounts. This can be changed, however, by going to, scrolling down to the “Authentication” group, and changing the ‘Server’ option.
Local account configuration¶
Settings for handling login via local accounts can be set by going to, then clicking the ‘Edit’ icon (a pencil) for ‘Local Database’. Here, you can improve security of local user accounts by setting password length and complexity constraints.
An overview of available settings:
Enable password policy constraints.
[Policy] Password duration, optionally define how often the user should change his or her password.
[Policy] Minimum password length to require.
[Policy] Enforce password complexity checks.
[Policy] Require SHA-512 password hashing instead of Blowfish
When using One Time Passwords in combination with the local database, the same policy constraints apply as configured in “Local Database”.
Our default Blowfish is not part of AES and is not considered compliant with any Federal Information Processing Standards (FIPS). Although more secure than SHA-512, its use may not be permitted in some environments.
When using external authentication services (such as ldap), the firewall needs a route to the configured target machine in order to function properly. Specifically when the server is only reachable over a classic IPsec tunnel (non VTI), a static route might be needed to guide the packets into the right tunnel matching the policy. (for example when a policy for LAN exists, add a gateway pointing to our own address and a static routing pusing traffic to the other end).
A quick test if the routes are properly setup can always be performed using ping from the
default source address.