Chapter 1 Using Fabric Os Commands; In This Chapter; Understanding Role-Based Access Control - Brocade Communications Systems Brocade 8/12c Command Reference Manual

Brocade fabric os command reference manual supporting fabric os v7.0.0 (april 2011)
Hide thumbs Also See for Brocade 8/12c:
Table of Contents

Advertisement

Using Fabric OS Commands

In this chapter

Understanding role-based access control

Fabric OS implements Role-Based Access Control (RBAC) to control access to all Fabric OS operations.
Seven predefine roles are supported, as described in
guided by perceived common operational situations and the operations and effects a role is permitted to
have on a fabric and individual fabric elements.
TABLE 2
Role Name
User
Operator
SwitchAdmin
ZoneAdmin
FabricAdmin
BasicSwitchAdmin
Admin
SecurityAdmin
In addition to these predefined roles, Fabric OS v7.0.0 provides support for creating user-defined roles.
Refer to the roleConfig command for more information.
Appendix A, "Command Availability"
to validate command execution, and provides the RBAC permissions for the commands included in this
manual. Alternately, you can use the classConfig command to display the RBAC permissions for any
specified command or meta-object format (MOF) class. Refer to the classConfig command for more
information.
Fabric OS Command Reference
53-1002147-01
Understanding role-based access control. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Understanding Virtual Fabric restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Understanding Admin Domain restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Using the command line interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Role definitions
Definition
Non-administrative use, such as monitoring system activity. In Fabric
OS v6.2.0 and later, the user account gains access to Fabric ID 128.
This is the default Logical Fabric after a firmware upgrade.
A subset of administrative tasks typically required for routine
maintenance operations.
Administrative use excluding security, user management, and zoning.
Zone management only.
Administrative use excluding user management and Admin Domain
management.
A subset of administrative tasks, typically of a more limited scope and
effect.
All administrative tasks, including encryption and chassis commands.
Administrative use including admin, encryption, security, user
management, and zoning.
Table
2. These predefined role definitions are
explains the standard Role-Based Access Control checks in place
Chapter
1
1

Advertisement

Table of Contents
loading

This manual is also suitable for:

Fabric os v7.0.0

Table of Contents