Contents
- Configuring Role-Based Access Control
- Role-Based Access Control
- User Accounts for Cisco VNMC
- Guidelines for Cisco VNMC Usernames
- Guidelines for Cisco VNMC Passwords
- User Roles
- Privileges
- User Locales
- Configuring User Roles
- Creating a User Role
- Editing a User Role
- Deleting a User Role
- Configuring User Locales
- Creating a Locale
- Editing a Locale
- Deleting a Locale
- Assigning an Organization to a Locale
- Deleting an Organization from a Locale
- Configuring Locally Authenticated User Accounts
- Creating a User Account
- Changing the Locales Assigned to a Locally Authenticated User Account
- Changing the Roles Assigned to a Locally Authenticated User Account
- Monitoring User Sessions
Configuring Role-Based Access Control
This chapter includes the following sections:
- Role-Based Access Control
- User Accounts for Cisco VNMC
- User Roles
- Privileges
- User Locales
- Configuring User Roles
- Configuring User Locales
- Configuring Locally Authenticated User Accounts
- Monitoring User Sessions
Role-Based Access Control
Role-Based Access Control (RBAC) is a method of restricting or authorizing system access for users based on user roles and locales. A role defines the privileges of a user in the system and the locale defines the organizations (domains) that a user is allowed access. Because users are not directly assigned privileges, management of individual user privileges is simply a matter of assigning the appropriate roles and locales.
A user is granted write access to desired system resources only if the assigned role grants the access privileges and the assigned locale allows access. For example, a user with the Server Administrator role in the Engineering organization could update server configurations in the Engineering organization but could not update server configurations in the Finance organization unless the locales assigned to the user include the Finance organization.
User Accounts for Cisco VNMC
User accounts are used to access the system. Up to 48 local user accounts can be configured in each Cisco VNMC instance. Each user account must have a unique username.
A local user can be authenticated using a password or an SSH public key. The public key can be set in either of the two formats: OpenSSH and SECSH.
Default User Account
Each Cisco VNMC instance has a default user account, admin, which cannot be modified or deleted. This account is the system administrator or superuser account and has full privileges. There is no default password assigned to the admin account; you must choose the password during the initial system setup.
Guidelines for Cisco VNMC Usernames
The username is also used as the login ID for Cisco VNMC. When you assign usernames to Cisco VNMC user accounts, consider the following guidelines and restrictions:
The login ID can contain between 1 and 32 characters, including the following:
The unique username for each user account cannot be all-numeric. You cannot create a local user with an all-numeric username.
The unique username cannot start with a number.
If an all-numeric username exists on an AAA server (LDAP) and is entered during login, Cisco VNMC cannot log in the user.
After you create a user account, you cannot change the username. You must delete the user account and create a new one.
Note
You can create up to 48 user accounts in a Cisco VNMC instance.
Guidelines for Cisco VNMC Passwords
For authentication purposes, a password is required for each user account. To prevent users from choosing insecure passwords, each password must be strong. If the Password Strength Check is enabled, then Cisco VNMC rejects any password that does not meet the following requirements:
Must contain a minimum of 8 characters.
Must contain at least three of the following:
Must not contain a character that is repeated more than 3 times consecutively, such as aaabbb.
Must not be identical to the username or the reverse of the username.
Must pass a password dictionary check. For example, the password must not be based on a standard dictionary word.
Must not contain the following symbols: $ (dollar sign), ? (question mark), and = (equals sign).
Should not be blank for local user and admin accounts.
Note
The Password Strength Check is enabled by default. You can disable it from the Locally Authenticated Users Pane.
Note
If the Cisco VNMC instance is configured to use remote authentication with LDAP, passwords for those remote accounts can be blank. With this configuration, the remote credentials store is used just for authentication, not authorization. The definition of the local user role definition applies to the remotely authenticated user.User Roles
User roles contain one or more privileges that define the operations allowed for the user who is assigned the role. A user can be assigned one or more roles. A user assigned multiple roles has the combined privileges of all assigned roles. For example, if Role1 has policy-related privileges, and Role2 has tenant-related privileges, users who are assigned to both Role1 and Role2 have policy and tenant related privileges.
All roles include read access to all configuration settings in the Cisco VNMC instance. The difference between the read-only role and other roles is that a user who is only assigned the read-only role cannot modify the system state. A user assigned another role can modify the system state in that user's assigned area or areas.
The system contains the following default user roles:
- aaa
User has read and write access to users, roles, and AAA configuration. Read access to the rest of the system.
- admin
User has complete read-and-write access to the entire system and has all privileges. The default admin account is assigned this role by default, and it cannot be changed.
- network
User creates organizations, security policies, and device profiles.
- operations
User acknowledges faults and performs some basic operations such as logging configuration.
- read-only
User has read-only access to system configuration and operational status with no privileges to perform any operations.
Roles can be created, modified to add new or remove existing privileges, or deleted. When a role is modified, the new privileges are applied to all users assigned to that role. Privilege assignment is not restricted to the privileges defined for the default roles. That is, you can use a custom set of privileges to create a unique role. For example, the default Network and Operations roles have different sets of privileges, but a new Network and Operations role can be created that combines the privileges of both roles.
If a role is deleted after it has been assigned to users, it is also deleted from those user accounts.
Privileges
User Privileges
Privileges give users assigned to user roles access to specific system resources and permission to perform specific tasks. The following table lists each privilege and its description.
Privilege Name Description AAA
System security and AAA
Admin
System administration
read-only
Read-only access
Read-only cannot be selected as a privilege; it is assigned to every user role
Resource Configuration
Compute firewall configuration
Policy Management
Compute firewall policy
Fault Management
Alarms and alarm policies
Operations
Logs, core file management, and show tech-support command
Tenant Management
Create, delete, and modify tenants and organization containers
User Locales
A user can be assigned one or more locales. Each locale defines one or more organizations (domains) to which the user is allowed access, and access would be limited to the organizations specified in the locale. One exception to this rule is a locale without any organizations, which gives unrestricted access to system resources in all organizations. Only the objects under organizations are controlled by locales. Access to other objects such as users, roles, and resources that are not present in the organization tree are not affected by locales.
Users with AAA Administrator privileges (AAA Administrator role) can assign organizations to the locale of other users. The assignment of organizations is restricted to only those in the locale of the user assigning the organizations. For example, if a locale contains only the Engineering organization then a user assigned that locale can only assign the Engineering organization to other users.Attention:AAA privileges must be carefully assigned because it allows a user to manage users' privileges and role assignments.
You can hierarchically manage organizations. A user that is assigned at a top level organization has automatic access to all organizations under it. For example, an Engineering organization can contain a Software Engineering organization and a Hardware Engineering organization. A locale containing only the Software Engineering organization has access to system resources only within that organization; however, a locale that contains the Engineering organization has access to the resources for both the Software Engineering and Hardware Engineering organizations.
Creating a User Role
Procedure
Editing a User Role
Procedure
Deleting a User Role
Procedure
Creating a Locale
Procedure
What to Do Next
Add the locale to one or more user accounts. For more information, see Changing the Locales Assigned to a Locally Authenticated User Account.
Editing a Locale
Procedure
Step 1 In the Navigation pane, click the Administration tab. Step 2 In the Navigation pane, click the Access Control subtab. Step 3 In the Navigation pane, click the Locales node. Step 4 In the Work pane, click the locale you want to edit. Step 5 Click the Edit link. Step 6 In the Description field, change the description as appropriate. Step 7 Click the Assign Organizations link and do the following: Step 8 Click OK.
Deleting a Locale
Before You BeginProcedure
Caution
If the locale you want to delete is assigned to any user/s, remove the locale from the user list of locales.
Step 1 In the Navigation pane, click the Administration tab. Step 2 In the Navigation pane, click the Access Control subtab. Step 3 In the Navigation pane, click the Locales node. Step 4 In the Work pane, click the locale you want to delete. Step 5 Click the Delete link. Step 6 In the Confirm dialog box, click Yes.
Assigning an Organization to a Locale
Procedure
Step 1 In the Navigation pane, click the Administration tab. Step 2 In the Navigation pane, click the Access Control subtab. Step 3 In the Navigation pane, expand where you want to assign an organization. Step 4 Click the Assign Organization link. Step 5 In the Assign Organization dialog box, complete the following: Step 6 Click OK.
Deleting an Organization from a Locale
Procedure
Step 1 In the Navigation pane, click the Administration tab. Step 2 In the Navigation pane, click the Access Control subtab. Step 3 In the Navigation pane, expand Locales. Step 4 In the Work pane, click the General tab. Step 5 In the Assigned Organizations area, click the organization you want to delete. Step 6 Click the Delete Organization link. Step 7 In the Confirm dialog box, click Yes.
Creating a User Account
Procedure
Step 1 In the Navigation pane, click the Administration tab. Step 2 In the Navigation pane, click the Access Control subtab. Step 3 In the Navigation pane, click the Locally Authenticated Users node. Step 4 In the Work pane, click the Create Locally Authenticated Users link. Step 5 In the Properties area, complete the following fields:
Name Description Login ID field
The log in name.
This name must be unique and meet the following guidelines and restrictions for Cisco VNMC user accounts:
After you save the user name, it cannot be changed. You must delete the user account and create a new one. You can create up to 48 user accounts for a single Cisco VNMC instance.
Description field
A description of the user.
First Name field
The first name of the user.
This field can contain up to 32 characters.
Last Name field
The last name of the user.
This field can contain up to 32 characters.
Email field
The email address of the user.
Phone field
The telephone number of the user.
Password field
The password associated with this account.
For maximum security, each password must be strong. If the Password Strength Check checkbox is checked, the system rejects any password that does not meet the following requirements:
The password must contain a minimum of 8 characters
The password must contain at least three of the following:
The password must not contain a character that is repeated more than 3 times consecutively, like aaabbb.
The password must not be the user name or the reverse of the user name.
The password must pass a password dictionary check. For example, the password must not be based on a standard dictionary word.
The password must not contain the following symbols: $ (dollar sign), ? (question mark), and = (equals sign).
The password should not be blank for local user and admin accounts.
Note The password strength check box on the Locally Authenticated Users pane can be checked off, so that the password is not restricted to be strong. It must, however, contain a minimum of 8 characters. The password field is not a required field and a user can be created without providing a password.
Confirm Password field
The password is entered here a second time for confirmation purposes.
Password Expires check box
The password expiration date.
Step 6 In the Roles/Locales tab area, complete the following fields:
Name Description Assigned Role area
The area in which you manage roles.
When a check box is checked, the user is assigned that role.
Assigned Locale area
The area in which you manage locales.
The Assigned Locales area contains the assigned locales check boxes. When a check box is checked, the user is assigned to that locale.
Step 7 In the SSH tab area, complete the following fields: Step 8 Click OK.
Changing the Locales Assigned to a Locally Authenticated User Account
Procedure
Step 1 In the Navigation pane, click the Administration tab. Step 2 In the Navigation pane, click the Access Control subtab. Step 3 In the Navigation pane, expand the Locally Authenticated Users node. Step 4 Click the User_name you want to modify. Step 5 In the Work pane, click the General tab. Step 6 In the Work pane, click the Roles/Locales tab. Step 7 In the Assigned Locale(s) area, do the following: Step 8 Click Save.
Changing the Roles Assigned to a Locally Authenticated User Account
Procedure
Step 1 In the Navigation pane, click the Administration tab. Step 2 In the Navigation pane, click the Access Control subtab. Step 3 In the Navigation pane, expand the Locally Authenticated Users node. Step 4 Click the User_name you want to modify. Step 5 In the Work pane, click the General tab. Step 6 Click the Roles/Locales tab. Step 7 In the Assigned Role(s) area, do the following: Step 8 Click Save.
Monitoring User Sessions
ProcedureYou can monitor a Cisco VNMC session for both locally authenticated users and remotely authenticated users.
Step 1 In the Navigation pane, click the Administration tab. Step 2 In the Navigation pane, click the Access Control subtab. Step 3 In the Navigation pane click and expand one of the following nodes:
Step 4 Select a User_name to monitor. Step 5 In the Work pane, click the Sessions tab to view the user session.