Skip to content

Commit 0a663a3

Browse files
authored
Merge pull request #204832 from suzizuber/szuber/update-nsxt-cloudadmin-concepts-identity
Update concepts-identity.md
2 parents 7ae0f6c + 3e6914d commit 0a663a3

File tree

1 file changed

+84
-13
lines changed

1 file changed

+84
-13
lines changed

articles/azure-vmware/concepts-identity.md

Lines changed: 84 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ description: Learn about the identity and access concepts of Azure VMware Soluti
44
ms.topic: conceptual
55
ms.service: azure-vmware
66
ms.date: 06/06/2022
7+
ms.custom: references_regions
78
---
89

910
# Azure VMware Solution identity concepts
@@ -25,7 +26,7 @@ You can view the privileges granted to the Azure VMware Solution CloudAdmin role
2526
1. Under **Access Control**, select **Roles**.
2627
1. From the list of roles, select **CloudAdmin** and then select **Privileges**.
2728

28-
:::image type="content" source="media/concepts/role-based-access-control-cloudadmin-privileges.png" alt-text="Screenshot showing the roles and privileges for CloudAdmin in the vSphere Client.":::
29+
:::image type="content" source="media/concepts/role-based-access-control-cloudadmin-privileges.png" alt-text="Screenshot shows the roles and privileges for CloudAdmin in the vSphere Client.":::
2930

3031
The CloudAdmin role in Azure VMware Solution has the following privileges on vCenter Server. For more information, see the [VMware product documentation](https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.security.doc/GUID-ED56F3C4-77D0-49E3-88B6-B99B8B437B62.html).
3132

@@ -59,7 +60,7 @@ You'll use the CloudAdmin role to create, modify, or delete custom roles with pr
5960
To prevent creating roles that can't be assigned or deleted, clone the CloudAdmin role as the basis for creating new custom roles.
6061

6162
#### Create a custom role
62-
1. Sign in to vCenter Server with cloudadmin\@vsphere.local or a user with the CloudAdmin role.
63+
1. Sign in to vCenter Server with [email protected] or a user with the CloudAdmin role.
6364

6465
1. Navigate to the **Roles** configuration section and select **Menu** > **Administration** > **Access Control** > **Roles**.
6566

@@ -80,37 +81,37 @@ To prevent creating roles that can't be assigned or deleted, clone the CloudAdmi
8081

8182
1. Select the Identity Source in the **User** drop-down where the group or user can be found.
8283

83-
1. Search for the user or group after selecting the Identity Source under the **User** section.
84+
1. Search for the user or group after selecting the Identity Source under the **User** section.
8485

8586
1. Select the role that you want to apply to the user or group.
8687

8788
1. Check the **Propagate to children** if needed, and select **OK**. The added permission displays in the **Permissions** section.
8889

8990
## NSX-T Manager access and identity
9091

91-
When a private cloud is provisioned using Azure portal, Software Defined Data Center (SDDC) management components like vCenter and NSX-T Manager are provisioned for customers.
92+
When a private cloud is provisioned using Azure portal, software defined data center (SDDC) management components like vCenter and NSX-T Manager are provisioned for customers.
9293

93-
Microsoft is responsible for the lifecycle management of NSX-T appliances like NSX-T Managers and NSX-T Edges. They're responsible for bootstrapping network configuration, like creating the Tier-0 gateway.
94+
Microsoft is responsible for the lifecycle management of NSX-T appliances like NSX-T Managers and NSX-T Edges. They're responsible for bootstrapping network configuration, like creating the Tier-0 gateway.
9495

9596
You're responsible for NSX-T software-defined networking (SDN) configuration, for example:
9697

9798
- Network segments
9899
- Other Tier-1 gateways
99100
- Distributed firewall rules
100-
- Stateful services like gateway firewall
101-
- Load balancer on Tier-1 gateways
101+
- Stateful services like gateway firewall
102+
- Load balancer on Tier-1 gateways
102103

103104
You can access NSX-T Manager using the built-in local user "admin" assigned to **Enterprise admin** role that gives full privileges to a user to manage NSX-T. While Microsoft manages the lifecycle of NSX-T, certain operations aren't allowed by a user. Operations not allowed include editing the configuration of host and edge transport nodes or starting an upgrade. For new users, Azure VMware Solution deploys them with a specific set of permissions needed by that user. The purpose is to provide a clear separation of control between the Azure VMware Solution control plane configuration and Azure VMware Solution private cloud user.
104105

105-
For new private cloud deployments starting **June 2022**, NSX-T access will be provided with a built-in local user cloud admin assigned to the **cloudadmin** role with a specific set of permissions to use NSX-T functionality for workloads. The new **cloudadmin** role will be rolled out in phases in all regions starting with West US and Australia East.
106-
107-
> [!NOTE]
108-
> Admin access to NSX-T will not be provided to users for private cloud deployments created after **June 2022**.
106+
For new private cloud deployments, NSX-T access will be provided with a built-in local user cloud admin assigned to the **cloudadmin** role with a specific set of permissions to use NSX-T functionality for workloads.
109107

110108
### NSX-T cloud admin user permissions
111109

112110
The following permissions are assigned to the **cloudadmin** user in Azure VMware Solution NSX-T.
113111

112+
> [!NOTE]
113+
> **NSX-T cloudadmin user** on Azure VMware Solution is not the same as the **cloudadmin user** mentioned in the VMware product documentation.
114+
114115
| Category | Type | Operation | Permission |
115116
|-----------------|-----------------------|----------------------------------------------------------------------|------------------------------------------------------------------|
116117
| Networking | Connectivity | Tier-0 Gateways<br>Tier-1 Gateways<br>Segments | Read-only<br>Full Access<br>Full Access |
@@ -126,10 +127,9 @@ The following permissions are assigned to the **cloudadmin** user in Azure VMwar
126127
| Troubleshooting | IPFIX | | Full Access |
127128
| Troubleshooting | Port Mirroring | | Full Access |
128129
| Troubleshooting | Traceflow | | Full Access |
129-
| System | Configuration<br>Settings<br>Settings<br>Settings | Identity firewall<br>Users and Roles<br>Certificate Management<br>User Interface Settings | Full Access<br>Full Access<br>Full Access<br>Full Access |
130+
| System | Configuration<br>Settings<br>Settings<br>Settings | Identity firewall<br>Users and Roles<br>Certificate Management (Service Certificate only)<br>User Interface Settings | Full Access<br>Full Access<br>Full Access<br>Full Access |
130131
| System | All other | | Read-only |
131132

132-
133133
You can view the permissions granted to the Azure VMware Solution cloudadmin role on your Azure VMware Solution private cloud NSX-T.
134134

135135
1. Log in to the NSX-T Manager.
@@ -140,6 +140,77 @@ You can view the permissions granted to the Azure VMware Solution cloudadmin rol
140140
> [!NOTE]
141141
> **Private clouds created before June 2022** will switch from **admin** role to **cloudadmin** role. You'll receive a notification through Azure Service Health that includes the timeline of this change so you can change the NSX-T credentials you've used for other integration.
142142
143+
## NSX-T LDAP integration for role based access control (RBAC)
144+
145+
In an Azure VMware Solution deployment, the NSX-T can be integrated with external LDAP directory service to add remote directory users or group, and assign them an NSX-T RBAC role, like on-premises deployment. For more information on how to enable NSX-T LDAP integration, see the [VMware product documentation](https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/administration/GUID-DB5A44F1-6E1D-4E5C-8B50-D6161FFA5BD2.html).
146+
147+
Unlike on-premises deployment, not all pre-defined NSX-T RBAC roles are supported with Azure VMware solution to keep Azure VMware Solution IaaS control plane config management separate from tenant network and security configuration. Please see the next section, Supported NSX-T RBAC roles, for more details.
148+
149+
> [!NOTE]
150+
> NSX-T LDAP Integration supported only with SDDC’s with NSX-T “cloudadmin” user.
151+
152+
### Supported and unsupported NSX-T RBAC roles
153+
154+
In an Azure VMware Solution deployment, the following NSX-T predefined RBAC roles are supported with LDAP integration:
155+
156+
- Auditor
157+
- Cloudadmin
158+
- LB Admin
159+
- LB Operator
160+
- VPN Admin
161+
- Network Operator
162+
163+
In an Azure VMware Solution deployment, the following NSX-T predefined RBAC roles are not supported with LDAP integration:
164+
165+
- Enterprise Admin
166+
- Network AdminSecurity Admin
167+
- Netx Partner Admin
168+
- GI Partner Admin
169+
170+
You can create custom roles in NSX-T with permissions lesser than or equal to Cloudadmin role created by Microsoft. Following are examples on how to create a supported "Network Admin" and "Security Admin" role.
171+
172+
> [!NOTE]
173+
> Custom role creation will fail if you assign a permission not allowed by Cloudadmin role.
174+
175+
#### Create “AVS network admin” role
176+
177+
Use the following steps to create this custom role.
178+
179+
1. Navigate to **System** > **Users and Roles** > **Roles**.
180+
181+
1. Clone **Network Admin** and provide the name, **AVS Network Admin**.
182+
183+
1. **Modify** the following permissions to "Read Only" or "None" as seen in the **Permission** column in the following table.
184+
185+
| Category | Subcategory | Feature | Permission |
186+
|-----------------|-----------------------|----------------------------------------------------------------------|------------------------------------------------------------------|
187+
| Networking<br><br><br> | Connectivity<br><br>Network Services | Tier-0 Gateways<br>Tier-0 Gateways > OSPF<br>Forwarding Policy | Read-only<br>None<br>None |
188+
189+
1. **Apply** the changes and **Save** the Role.
190+
191+
#### Create “AVS security admin” role
192+
193+
Use the following steps to create this custom role.
194+
195+
1. Navigate to **System** > **Users and Roles** > **Roles**.
196+
197+
1. Clone **Security Admin** and provide the name, “AVS Security Admin”.
198+
199+
1. **Modify** the following permissions to "Read Only" or "None" as seen in the **Permission** column in the following table.
200+
201+
| Category | Subcategory | Feature | Permission |
202+
|-----------------|-----------------------|----------------------------------------------------------------------|------------------------------------------------------------------|
203+
| Networking | Network Services | Forwarding Policy | None |
204+
| Security<br><br><br> | Network Introspection<br>Endpoint Protection<br>Settings | <br><br>Service profiles | None<br>None<br>None |
205+
206+
4. **Apply** the changes and **Save** the Role.
207+
208+
> [!NOTE]
209+
> The NSX-T **System** > **Identity Firewall AD** configuration option isn't supported by the NSX custom role. The recommendation is to assign the **Security Operator** role to the user with the custom role to allow managing the Identity Firewall (IDFW) feature for that user.
210+
211+
> [!NOTE]
212+
> The NSX-T Traceflow feature isn't supported by NSX-T custom role. The recommendation is to assign the **Auditor** role to the user along with above custom role to enable Traceflow feature for that user.
213+
143214
## Next steps
144215

145216
Now that you've covered Azure VMware Solution access and identity concepts, you may want to learn about:

0 commit comments

Comments
 (0)