Limitations Of Smi-A User-To-Switch User Mapping; Smi Agent Security - Brocade Communications Systems 53-1001778-01 User Manual

Brocade communications systems
Table of Contents

Advertisement

FIGURE 9
6. Click Apply.

Limitations of SMI-A user-to-switch user mapping

SMI Agent security

This section describes how to use the Brocade SMI Agent Configuration Tool to configure security
options.
Brocade SMI Agent User's Guide
53-1001778-01
User Mapping Configuration dialog box
The value in the Status column changes from Not Persisted to Persisted.
Indications are not filtered based on the SMI-A user names. Indications related to fabrics for
which the SMI-A user does not have access will still be delivered.
It is not recommended to map default SMI-A users to a zoneadmin switch user. If default SMI-A
users are mapped to a zoneadmin switch user, then the Brocade SMI Agent Configuration Tool
is unable to display the status of the fabric connection.
For VF-enabled chassis, read or write access restrictions are not allowed for each logical fabric
separately. If the SMI-A user is mapped to a switch user on a VF-enabled chassis, then the
SMI-A user has the same access privilege for all of the logical fabrics in the chassis.
For VF-enabled chassis, the switch user mapped in User mapping and Default User mapping
configurations should have access to at least one of the logical fabrics configured in the
VF-enabled chassis.
The SMI Agent does not restrict access based on the VF list accessible to the switch user in a
VF-enabled chassis. The SMI Agent uses the RBAC permission map of the proxy switch alone.
For switches running Fabric OS 6.3.x or earlier, RBAC restrictions in the SMI Agent cannot be
specific to certain logical fabrics. To get the same RBAC behavior in the SMI Agent for switches
running Fabric OS 6.4.x or later, the chassis role of these switches should not be more access
restrictive than the switch role.
"Mutual authentication setup,"
"Configuring mutual authentication for clients"
"Configuring mutual authentication for indications"
"Configuring HTTP access"
"Importing client certificates"
"Exporting server certificates"
"Viewing or deleting client certificates from SMI-A server truststore"
"Configuring user authentication"
next
on page 22
on page 23
on page 24
on page 25
on page 26
on page 28

SMI Agent security

on page 27
3
21

Advertisement

Table of Contents
loading

This manual is also suitable for:

Smi agent 120.11.0

Table of Contents