Understanding Virtual Fabric Restrictions - Brocade Communications Systems StoreFabric SN6500B Command Reference Manual

Brocade fabric os command reference v7.1.0 (53-1002746-01, march 2013)
Hide thumbs Also See for StoreFabric SN6500B:
Table of Contents

Advertisement

1
Understanding Role-Based Access Control
Understanding Role-Based Access Control
Fabric OS implements Role-Based Access Control (RBAC) to control access to all Fabric OS operations.
Seven predefined roles are supported, as described in
guided by perceived common operational situations and the operations and effects a role is permitted to
have on a fabric and individual fabric elements.
TABLE 2
Role name
User
Operator
SwitchAdmin
ZoneAdmin
FabricAdmin
BasicSwitchAdmin
Admin
SecurityAdmin
In addition to these predefined roles, Fabric OS v7.0.0 and later provides support for creating
user-defined roles. Refer to the roleConfig command for more information.
Additional command restrictions apply depending on whether Virtual Fabrics or Admin Domains are
enabled in a fabric. Refer to
NOTE
Virtual Fabrics and Admin Domains are mutually exclusive and are not supported at the same time on a
switch. To use Admin Domains, you must first disable Virtual Fabrics; to use Virtual Fabrics, you must first
delete all Admin Domains. Use ad --clear -f to remove all Admin Domains. Refer to the Fabric OS
Administrator's Guide for more information.
Encryption commands and permissions
There are two system RBAC roles that are permitted to perform encryption operations.
2
Role definitions
Definition
Non-administrative use, such as monitoring system activity. In Fabric
OS v6.2.0 and later, the user account gains access to Fabric ID 128.
This is the default logical fabric after a firmware upgrade.
A subset of administrative tasks typically required for routine
maintenance operations.
Administrative use excluding security, user management, and zoning.
Zone management only.
Administrative use excluding user management and Admin Domain
management.
A subset of administrative tasks, typically of a more limited scope and
effect.
All administrative tasks, including encryption and chassis commands.
Administrative use including admin, encryption, security, user
management, and zoning.
Appendix A, "Command
Admin and SecurityAdmin
Users authenticated with the Admin and SecurityAdmin RBAC roles may perform cryptographic
functions assigned to the FIPS Crypto Officer, including the following:
-
Perform encryption node initialization.
-
Enable cryptographic operations.
-
Manage critical security parameters (CSPs) input and output functions.
-
Zeroize encryption CSPs.
-
Register and configure a key vault.
-
Configure a recovery share policy.
Table
2. These predefined role definitions are
Availability",
Fabric OS Command Reference
53-1002746-01

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Fabric os v7.1.0

Table of Contents