You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Manage emergency access to a bare metal machine using the `az networkcloud cluster bmckeyset`
13
13
14
14
> [!CAUTION]
15
-
> Please note this process is used in emergency situations when all other troubleshooting options via Azure have been exhausted. SSH access to these bare metal machines is restricted to users managed via this method from the specified jump host list.
15
+
> Please note this process is used in emergency situations when all other troubleshooting options via Azure are exhausted. SSH access to these bare metal machines is restricted to users managed via this method from the specified jump host list.
16
16
17
-
There are rare situations where a user needs to investigate & resolve issues with a bare metal machine and all other ways using Azure have been exhausted. Operator Nexus provides the `az networkcloud cluster bmckeyset` command so users can manage SSH access to the baseboard management controller (BMC) on these bare metal machines. On keyset creation, users are validated against Microsoft Entra ID for proper authorization by cross referencing the User Principal Name provided for a user against the supplied Azure Group ID `--azure-group-id <Entra Group ID>`.
17
+
There are rare situations where a user needs to investigate & resolve issues with a bare metal machine and all other ways using Azure are exhausted. Operator Nexus provides the `az networkcloud cluster bmckeyset` command so users can manage SSH access to the baseboard management controller (BMC) on these bare metal machines. On keyset creation, users are validated against Microsoft Entra ID for proper authorization by cross referencing the User Principal Name provided for a user against the supplied Azure Group ID `--azure-group-id <Entra Group ID>`.
18
18
19
-
If the User Principal Name for a user isn't a member of the supplied group, the user's status is set to 'Invalid', and their status message will say "Invalid because userPrincipal isn't a member of AAD group." If the Azure Group ID is invalid, each user in the keyset has their status set to 'Invalid' and their status message will say "AAD group doesn't exist." Invalid users remain in the keyset but their key won't be enabled for SSH access.
19
+
If the User Principal Name for a user isn't a member of the supplied group, the user's status is set to "Invalid." Additionally, their status message is set to "Invalid because userPrincipal isn't a member of Entra group." If the Azure Group ID is invalid, each user in the keyset has their status set to "Invalid" and their status message is set to "Entra group doesn't exist." Invalid users remain in the keyset but their key aren't for SSH access.
20
20
21
21
> [!NOTE]
22
22
> There is currently a transitional period where specifying User Principal Names is optional. In a future release, it will become mandatory and Microsoft Entra ID validation will be enforced for all users. Users are encouraged to add User Principal Names to their keysets before the transitional period ends (planned for July 2024) to avoid keysets being invalidated. Note that if any User Principal Names are added to a keyset, even if they are not added for all users, Microsoft Entra ID validation will be enabled, and this will result in the entire keyset being invalidated if the Group ID specified is not valid.
@@ -35,7 +35,7 @@ The BMCs support a maximum number of 12 users. Users are defined on a per Cluste
35
35
- To restrict access for managing keysets, create a custom role. For more information, see [Azure Custom Roles](../role-based-access-control/custom-roles.md). In this instance, add or exclude permissions for `Microsoft.NetworkCloud/clusters/bmcKeySets`. The options are `/read`, `/write`, and `/delete`.
36
36
37
37
> [!NOTE]
38
-
> When BMC access is created, modified or deleted via the commands described in this
38
+
> When BMC access is created, modified, or deleted via the commands described in this
39
39
> article, a background process delivers those changes to the machines. This process is paused during
40
40
> Operator Nexus software upgrades. If an upgrade is known to be in progress, you can use the `--no-wait`
41
41
> option with the command to prevent the command prompt from waiting for the process to complete.
@@ -76,8 +76,9 @@ az networkcloud cluster bmckeyset create \
76
76
--cluster-name [Required] : The name of the cluster.
77
77
--expiration [Required] : The date and time after which the users
78
78
in this key set are removed from
79
-
the BMCs. The limit is up to 1 year from creation.
80
-
Format is "YYYY-MM-DDTHH:MM:SS.000Z"
79
+
the BMCs. The maximum expiration date is a
80
+
year from creation date. Format is
81
+
"YYYY-MM-DDTHH:MM:SS.000Z".
81
82
--extended-location [Required] : The extended location of the cluster
82
83
associated with the resource.
83
84
Usage: --extended-location name=XX type=XX
@@ -208,14 +209,11 @@ az networkcloud cluster bmckeyset update \
208
209
```azurecli
209
210
--bmc-key-set-name --name -n [Required] : The name of the BMC key set.
210
211
--cluster-name [Required] : The name of the cluster.
211
-
--expiration : The date and time after which the users
212
+
--expiration [Required] : The date and time after which the users
212
213
in this key set are removed from
213
-
the BMCs. Format is:
214
-
"YYYY-MM-DDTHH:MM:SS.000Z"
215
-
--jump-hosts-allowed : The list of IP addresses of jump hosts
216
-
with management network access from
217
-
which a login is allowed for the
218
-
users. Supports IPv4 or IPv6 addresses.
214
+
the BMCs. The maximum expiration date is a
215
+
year from creation date. Format is
216
+
"YYYY-MM-DDTHH:MM:SS.000Z".
219
217
--privilege-level : The access level allowed for the users
# Manage emergency access to a bare metal machine using the `az networkcloud cluster baremetalmachinekeyset`
13
13
14
14
> [!CAUTION]
15
-
> Please note this process is used in emergency situations when all other troubleshooting options using Azure have been exhausted. SSH access to these bare metal machines is restricted to users managed via this method from the specified jump host list.
15
+
> Please note this process is used in emergency situations when all other troubleshooting options using Azure are exhausted. SSH access to these bare metal machines is restricted to users managed via this method from the specified jump host list.
16
16
17
-
There are rare situations where a user needs to investigate & resolve issues with a bare metal machine and all other ways have been exhausted via Azure. Azure Operator Nexus provides the `az networkcloud cluster baremetalmachinekeyset` command so users can manage SSH access to these bare metal machines. On keyset creation, users are validated against Microsoft Entra ID for proper authorization by cross referencing the User Principal Name provided for a user against the supplied Microsoft Entra ID `--azure-group-id <Entra Group ID>`.
17
+
There are rare situations where a user needs to investigate & resolve issues with a bare metal machine and all other ways via Azure are exhausted. Azure Operator Nexus provides the `az networkcloud cluster baremetalmachinekeyset` command so users can manage SSH access to these bare metal machines. On keyset creation, users are validated against Microsoft Entra ID for proper authorization by cross referencing the User Principal Name provided for a user against the supplied Microsoft Entra ID `--azure-group-id <Entra Group ID>`.
18
18
19
-
If the User Principal Name for a user isn't a member of the supplied group, the user's status is set to 'Invalid', and their status message will say "Invalid because userPrincipal isn't a member of AAD group." If the Azure Group ID is invalid, each user in the keyset will have their status set to 'Invalid' and their status message will say "AAD group doesn't exist." Invalid users remain in the keyset but their key won't be enabled for SSH access.
19
+
If the User Principal Name for a user isn't a member of the supplied group, the user's status is set to "Invalid." Additionally, their status message reads "Invalid because userPrincipal isn't a member of Entra group." If the Azure Group ID is invalid, each user in the keyset has their status set to "Invalid" and their status message says "Entra group doesn't exist." Invalid users remain in the keyset but their key aren't enabled for SSH access.
20
20
21
21
> [!NOTE]
22
22
> There is currently a transitional period where specifying User Principal Names is optional. In a future release, it will become mandatory and Microsoft Entra ID validation will be enforced for all users. Users are encouraged to add User Principal Names to their keysets before the transitional period ends (planned for July 2024) to avoid keysets being invalidated. Note that if any User Principal Names are added to a keyset, even if they are not added for all users, Microsoft Entra ID validation will be enabled, and this will result in the entire keyset being invalidated if the Group ID specified is not valid.
@@ -28,7 +28,7 @@ There's no limit to the number of users in a group.
28
28
> [!CAUTION]
29
29
> Notes for jump host IP addresses
30
30
31
-
- The keyset create/update process adds the jump host IP addresses to the IP tables for each machine in the Cluster. This restricts SSH access to be allowed only from those jump hosts.
31
+
- The keyset create/update process adds the jump host IP addresses to the IP tables for each machine in the Cluster. The IP tables update restricts SSH access to be allowed only from those jump hosts.
32
32
- It's important to specify the Cluster facing IP addresses for the jump hosts. These IP addresses might be different than the public facing IP address used to access the jump host.
33
33
- Once added, users are able to access bare metal machines from any specified jump host IP including a jump host IP defined in another bare metal machine keyset group.
34
34
- Existing SSH access remains when adding the first bare metal machine keyset. However, the keyset command limits an existing user's SSH access to the specified jump host IPs in the keyset commands.
@@ -43,7 +43,7 @@ There's no limit to the number of users in a group.
43
43
- To restrict access for managing keysets, create a custom role. For more information, see [Azure Custom Roles](../role-based-access-control/custom-roles.md). In this instance, add or exclude permissions for `Microsoft.NetworkCloud/clusters/bareMetalMachineKeySets`. The options are `/read`, `/write`, and `/delete`.
44
44
45
45
> [!NOTE]
46
-
> When bare metal machine access is created, modified or deleted via the commands described in this
46
+
> When bare metal machine access is created, modified, or deleted via the commands described in this
47
47
> article, a background process delivers those changes to the machines. This process is paused during
48
48
> Operator Nexus software upgrades. If an upgrade is known to be in progress, you can use the `--no-wait`
49
49
> option with the command to prevent the command prompt from waiting for the process to complete.
@@ -86,8 +86,9 @@ az networkcloud cluster baremetalmachinekeyset create \
86
86
--cluster-name [Required] : The name of the cluster.
87
87
--expiration [Required] : The date and time after which the users
88
88
in this key set are removed from
89
-
the bare metal machines. Format is:
90
-
"YYYY-MM-DDTHH:MM:SS.000Z"
89
+
the bare metal machines. The maximum
90
+
expiration date is a year from creation
91
+
date. Format is: "YYYY-MM-DDTHH:MM:SS.000Z".
91
92
--extended-location [Required] : The extended location of the cluster
92
93
associated with the resource.
93
94
Usage: --extended-location name=XX type=XX
@@ -228,8 +229,9 @@ az networkcloud cluster baremetalmachinekeyset update \
228
229
--cluster-name [Required] : The name of the cluster.
229
230
--expiration : The date and time after which the users
230
231
in this key set are removed from
231
-
the bare metal machines. Format is:
232
-
"YYYY-MM-DDTHH:MM:SS.000Z"
232
+
the bare metal machines. The maximum
233
+
expiration date is a year from creation
234
+
date. Format is: "YYYY-MM-DDTHH:MM:SS.000Z".
233
235
--jump-hosts-allowed : The list of IP addresses of jump hosts
0 commit comments