You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Breakglass access using Method D v2.0 is a streamlined approach for administrators to grant secure, emergency access to critical network fabric devices. This guide will walk you through setting up and using Breakglass access, including generating SSH keys, granting permissions, and accessing network fabric devices.
14
+
Breakglass access using Method D v2.0 is a streamlined approach for administrators to grant secure, emergency access to critical network fabric devices. This guide walks you through setting up and using Breakglass access, including generating SSH keys, granting permissions, and accessing network fabric devices.
15
15
16
16
## Generating SSH Keys using the Nexusidentity Azure CLI
17
17
18
-
To start with Breakglass IAM configuration, you will need to set up SSH keys using the Nexusidentity extension. Make sure you have the following prerequisites installed and updated.
18
+
To start with Breakglass IAM configuration, you need to set up SSH keys using the Nexusidentity extension. Make sure you have the following prerequisites installed and updated.
19
19
20
20
### Prerequisites
21
21
@@ -97,7 +97,7 @@ To enable Breakglass access administrator can assign below roles to Entra users
97
97
98
98
- **Nexus Network Fabric Service Writer**:
99
99
100
-
- Allows show commands as well as commands to modify the running configuration.
100
+
- Allows show commands and commands to modify the running configuration.
101
101
102
102
Once these roles are assigned, the corresponding username and public SSH key will be automatically provisioned across all devices within the designated fabric instance.
103
103
@@ -109,7 +109,7 @@ Once these roles are assigned, the corresponding username and public SSH key wil
109
109
110
110
## 3. Break-glass access to Network Fabric device
111
111
112
-
Once permissions are granted, users can access network fabric devices with their FIDO-2 hardware token (e.g., YubiKey). Follow the steps below to use Breakglass access.
112
+
Once permissions are granted, users can access network fabric devices with their FIDO-2 hardware token (for example, YubiKey). Follow the steps below to use Breakglass access.
0 commit comments