Adding OpenVPN Remote Access Users

The method for adding users to the VPN depends upon the OpenVPN server authentication method and backend (e.g. Local Database, RADIUS, LDAP).

Local Database

OpenVPN authenticates local database users based on their entries in the user manager.

To create a new user with a certificate, follow these steps:

  • Navigate to System > User Manager

  • Click fa-plus To add a user

  • Fill in the settings as follows:


    The username for this client.

    Password/Confirm password

    The password for this client.

    Full Name

    An optional longer name for this user.

    Click to create a user certificate


    Descriptive Name

    Same value as the Username

    Certificate Authority

    The CA used by the OpenVPN server.

    Key Type

    The type of private key to use for this certificate, either RSA or ECDSA and its accompanying Key Length (RSA) or Curve (ECDSA). The default is an acceptable choice.


    The number of days for which the certificate is valid. The default of 3650 (approximately 10 years) is acceptable for a user certificate.

  • Click Save

To view or change the user:

  • Navigate to System > User Manager

  • Click fa-pencil next to the row containing the user to see/edit

To export a user certificate and key:


The OpenVPN Client Export Package (OpenVPN Client Export Package) can package up the certificates and other data automatically. The client export package is a much easier way to download client configurations and installation files than exporting these items manually.

  • Navigate to System > Cert Manager on the Certificates tab

  • Locate the user certificate in the list

  • Click fa-certificate to download the user certificates

  • Click fa-key to download the key for the certificate


    To password protect the private key, edit the certificate, enter an Export Password, and click Export Private Key on that page.

  • Click fa-archive to download a PKCS#12 bundle which includes the user certificate and key, and the CA Certificate (optional).


    To password protect the PKCS#12 bundle, edit the certificate, enter an Export Password, and click Export PKCS#12 on that page.

Most use cases which utilize a user certificate will also require the CA Certificate which signed the user certificate. Export the CA certificate from its entry on System > Cert Manager, CAs tab or use one of the PKCS#12 bundle options.


Adding LDAP and RADIUS users fully depends on the server implementation and management tools, which are beyond the scope of this documentation. Contact the server administrator or software vendor for assistance.

Certificates for LDAP or RADIUS users cannot be created from within the firewall GUI in a way that reflects a user-certificate relationship but they can be created independently as user certificates in the certificate manager. Create user certificates with the certificate manager as described in User Certificates