Information
Centralized management of authentication settings increases the security of remote and nonlocal access methods. This control is particularly important protection against the insider threat. With robust centralized management, audit records for administrator account access to the organization's network devices can be more readily analyzed for trends and anomalies. The alternative method of defining administrator accounts on each device exposes the device configuration to remote access authentication attacks and system administrators with multiple authenticators for each network device.
Solution
Configure the network device to use an authentication server.
set system radius-server <RADIUS-1 address> secret '<PSK>'
set system tacplus-server <TACPLUS-1 address> secret '<PSK>'
Configure the authentication order to use the authentication server as primary source for authentication.
set system authentication-order radius
set system authentication-order tacplus
set system authentication-order password