INNOVEXUS
Integration · Juniper

Innovexus + Juniper.MX, EX, QFX, SRX — Junos PAM without an agent.

Juniper devices anchor a meaningful share of service provider, data centre, and enterprise networks. Innovexus brokers SSH and console sessions to every Junos platform — no agent installs, no Junos Space dependency, no vendor-specific tooling required. Sessions are recorded, credentials rotate on schedule, configuration commits are baselined and diffed against drift.

§ 01 / Supported devices and OS

Juniper platforms supported.

Innovexus is agentless from the Junos device perspective. Connection is via standard SSH (preferred) and console (serial-over-IP). Anything that authenticates against TACACS+, RADIUS, or local users with class-based authorisation is in scope.

Device family
OS / platform
Examples
Notes
MX Series routers
Junos / Junos OS Evolved
MX5, MX10, MX204, MX240, MX480, MX960, MX10000
Full session recording, vault, rotation, drift detection
EX Series switches
Junos
EX2300, EX3400, EX4300, EX4600, EX9200
Virtual chassis-aware role mapping
QFX Series switches
Junos
QFX5100, QFX5120, QFX5200, QFX10000
Standalone, VC, and EVPN/VXLAN fabric environments
SRX Series firewalls
Junos
SRX300, SRX1500, SRX4000, SRX5000
CLI access; commit-confirmed workflow respected
PTX / ACX / NFX
Junos / Junos OS Evolved
PTX10000, ACX5000, NFX150/250
Full feature parity with MX
§ 02 / How the integration works

Junos-specific setup, in plain language.

Most Juniper fleets are running through Innovexus within 1–2 business days. The integration uses standard Junos AAA primitives — class-based authorisation, login classes, and TACACS+ or RADIUS. Nothing in the Junos config beyond standard AAA is required.

  1. 01

    Vault local user credentials

    Vault the local users that exist as fallback for AAA failure (typically `root` and a privileged operations class). The Innovexus pod is now the source of truth; rotation runs on schedule.

  2. 02

    Allowlist the pod IP

    Add the Innovexus pod's outbound IP to your management allowlist (`system services ssh allow-from`, firewall filters protecting RE, or your jump-host equivalent). Existing TACACS+/RADIUS continues to handle AAA at the device level.

  3. 03

    Login class mapping

    Map your Junos login classes (`super-user`, `operator`, `read-only`, custom classes) to Innovexus role definitions. Engineers see only devices and login classes their role permits. Existing class-based command authorization at the device is unchanged.

  4. 04

    Configure session recording and commit-confirmed handling

    Session recording captures the full Junos CLI experience including configuration mode, commit-confirmed timeouts, and rollback events. Configuration drift collection uses `show configuration | display set` for diff-friendly baseline storage.

  5. 05

    Engineers connect through the pod

    Engineers log into Innovexus with their FIDO2 hardware key, click into a Junos device, and the brokered SSH session opens with their assigned login class. Recording, audit, and credential lifecycle all operate automatically.

§ 03 / What you get

What you get once integrated.

/ 01

Full Junos session recording

Configuration mode entries, commit-confirmed sessions, rollback events, and operational mode commands all captured. Searchable text across the session history fleet-wide.

/ 02

Atomic credential rotation

Local user credentials, TACACS+ shared secrets, and RADIUS keys rotate on schedule without commit-confirmed conflicts. Rotation respects Junos's commit semantics.

/ 03

IP-locked pod sessions

Junos devices accept management connections only from the Innovexus pod. Lost engineer endpoints cannot connect directly — the pod is the only authorised source.

/ 04

Configuration drift detection

Continuous baseline collection in `display set` format for clean diffs. Drift detected outside approved Innovexus sessions fires an alert. Commit-confirmed timeouts that auto-rollback are preserved as audit events.

/ 05

Mixed-vendor audit trail

Junos sessions land in the same signed audit chain as Cisco, Arista, and other vendor sessions. One audit log to search, one compliance evidence bundle, one place to look during incident review.

/ 06

NOC + SOC bundled

Network monitoring and security operations alongside PAM in one console. Same audit trail, same identity model, one tier price.

Juniper integration · FAQ

Common questions about Innovexus and Juniper

Direct, sourced answers about how Innovexus integrates with this vendor's platforms.

01

Does Innovexus require Junos Space or Mist?

No. The integration is direct via SSH using standard Junos AAA. Junos Space, Mist Cloud, or Apstra are not required and are not dependencies. If you already run any of those for orchestration or management, Innovexus runs alongside them — we handle privileged human and vendor access; they handle their respective orchestration domains.

02

How does this handle Junos commit-confirmed workflows?

Commit-confirmed sessions are recorded as a single continuous session through to either the manual commit or the automatic rollback timeout. Rollback events are captured as discrete audit entries. The signed session record includes the full pre-commit, commit, and post-commit state — auditor-friendly for change management evidence.

03

Can Innovexus rotate Junos `root` credentials safely?

Yes. The vault rotates `root` on schedule. The rotation respects Junos's `system root-authentication` configuration model and uses the candidate-config + commit workflow to update atomically. Rotation failure is detected on the next scheduled cycle and surfaces a NOC alert.

04

Does this work with Junos OS Evolved?

Yes. Junos OS Evolved (PTX10000 series, MX10000 newer hardware) is supported. The integration uses the same SSH and AAA primitives. Configuration baseline collection and drift detection account for Junos OS Evolved's structured commit model.

05

How does this integrate with NETCONF-based automation?

NETCONF is supported as an alternate management interface alongside SSH CLI sessions. Engineers can have brokered SSH sessions for interactive work; automated NETCONF tooling (Ansible, PyEZ, custom scripts) authenticates with vault-issued short-lived credentials retrieved through the platform API. Both paths log to the unified audit trail.

06

What about SRX firewall management — is it different from MX/EX?

No, SRX management uses the same Junos CLI and AAA primitives. Innovexus treats SRX devices as a Junos integration with the same feature set — session recording, credential vaulting, drift detection. SRX-specific features (security policies, IDP, application security) are configured at the device through the brokered session as you would today.

Junos fleet on unified PAM, in days.

FROM $199 / MO5-DAY FREE TRIAL

Vault credentials for one Junos device class, allowlist the pod IP, point engineers at it. First brokered session within an hour. 5-day trial, no card required.