Secrets

OpenVPN secrets (users) are used for authentication. You can use certificate-only authentication or combine certificates with username/password.

In WinBox you can configure OpenVPN secrets in PPP -> Secrets, there you can click to + to create new user or you can use terminal with command /ppp secret


Authentication methods

Certificate-only authentication

When using certificate-only authentication, no PPP secrets are needed. Client authentication is handled entirely through certificates.

This method is enabled by setting require-client-certificate=yes on the OpenVPN server and not configuring any PPP secrets.

Advantages:

  • More secure (no password to compromise)

  • Easier to manage for small number of users

  • Certificate revocation is possible

Disadvantages:

  • Each client needs individual certificate

  • More complex initial setup

Certificate + Username/Password

This method combines certificate authentication with traditional username/password authentication.

Advantages:

  • Additional security layer

  • Easier user management

  • Can use same certificate for multiple users

Disadvantages:

  • Passwords can be compromised

  • More complex for users


Creating PPP secrets

Basic user configuration

Click on + to add new PPP secret

You will need to fill out:

  • Name - Username for the VPN connection

  • Password - User's password

  • Service - Select "ovpn"

  • Profile - Select appropriate VPN profile

  • Local Address - (Optional) Router's tunnel endpoint IP

  • Remote Address - (Optional) Specific IP for this user

Advanced user settings

For more control over individual users:

  • Routes - Static routes to be added when user connects

  • Rate Limit - Bandwidth limitation for the user

  • Comment - Description for the user

Assigning specific IP addresses

You can assign specific IP addresses to users:


User management

Disabling users

To temporarily disable a user without deleting:

Enabling users

To re-enable a disabled user:

Changing passwords

To update a user's password:


Multiple authentication profiles

Different user groups

Create different profiles for different user types:

Rate limiting per user type

Set different bandwidth limits for different user groups:


Security considerations

Password policy

Strong password requirements:

  • Minimum 12 characters

  • Mix of uppercase, lowercase, numbers, and symbols

  • Avoid dictionary words

  • Regular password changes

Certificate management

When using certificate + password authentication:

  1. Each user should have unique certificate

  2. Certificates should have reasonable expiration dates

  3. Revoked certificates should be properly managed

  4. Certificate common names should match usernames

Monitoring access

Check active connections and user activity:


Show complete user setup examples

Best practices

User account management

  1. Regular audits - Review and remove unused accounts

  2. Password rotation - Implement regular password changes

  3. Access logging - Monitor and log all access attempts

  4. Principle of least privilege - Give users minimum required access

Certificate management

  1. Individual certificates - Each user should have unique certificate

  2. Certificate expiration - Set appropriate validity periods

  3. Revocation process - Have clear process for certificate revocation

  4. Backup certificates - Securely backup CA and certificates

Troubleshooting authentication

Authentication failures:

  • Check username and password spelling

  • Verify user account is enabled

  • Check certificate validity and trust

  • Review server logs for detailed error messages

Connection issues:

  • Verify profile configuration

  • Check IP pool availability

  • Test network connectivity

  • Review firewall rules

Last updated

Was this helpful?