|
| 1 | +--- |
| 2 | +title: How to set up Method D v2.0 secure break-glass access |
| 3 | +description: Process of setting up secure break-glass access using Method D v2.0 |
| 4 | +author: sushantjrao |
| 5 | +ms.author: sushrao |
| 6 | +ms.service: azure-operator-nexus |
| 7 | +ms.topic: how-to |
| 8 | +ms.date: 11/04/2024 |
| 9 | +ms.custom: template-how-to, devx-track-azurecli |
| 10 | +--- |
| 11 | + |
| 12 | +# Set up Method D v2.0 secure break-glass access |
| 13 | + |
| 14 | +The Break-Glass mechanism provides temporary and emergency access to Azure Operator Nexus devices or services, primarily for disaster recovery, incident response, or essential maintenance. Access is granted under controlled Identity Access Management (IAM) policies, maintaining security even during emergencies. |
| 15 | + |
| 16 | +For Network Fabric environments, the current break-glass model, known as Method D v1.5, relies on password authentication. This model, however, is limited to 15 shared accounts and poses significant security risks. Method D v2.0 introduces a modernized approach, implementing FIDO-2 devices and SSH keys to secure break-glass access. Key improvements include: |
| 17 | + |
| 18 | +- **Strict access control**: Customer administrators control access through individual assignments instead of shared accounts. |
| 19 | + |
| 20 | +- **Strong authentication**: Break-glass access is managed via Microsoft Entra with multifactor authentication (MFA) eliminating local account dependencies. |
| 21 | + |
| 22 | +- **Enhanced security**: All access attempts are logged for audit and investigation purposes. |
| 23 | + |
| 24 | +## FIDO2 token |
| 25 | + |
| 26 | +In the Method D v2.0 model, break-glass users uses a FIDO2 token to create and upload a public key linked to their Entra identity. This configuration provides secure SSH access to Fabric devices. Entra Role-Based Access Control (RBAC) manages authorization, allowing administrators to assign appropriate access levels to users. |
| 27 | + |
| 28 | +For offline accessibility, usernames, public keys, and permissions are pre-provisioned on all the Network Fabric devices, allowing break-glass SSH login without requiring an active Azure connection. |
| 29 | + |
| 30 | +Each FIDO2 token serves usually as a physical USB device, offering unphishable, multifactor authentication through user presence and PIN verification. |
| 31 | + |
| 32 | +## Method D v2.0 setup and operations |
| 33 | + |
| 34 | +This guide is divided into two sections |
| 35 | + |
| 36 | +1. **Method D v2.0 infrastructure setup** - Mandatory for both existing and new Network Fabric (NF) deployments running Runtime Fabric version 4.0.0. |
| 37 | + |
| 38 | +2. [**Using Method D v2.0 break glass access**](howto-use-break-glass-access.md) |
| 39 | + |
| 40 | + |
| 41 | +### Method D v2.0 infrastructure setup |
| 42 | + |
| 43 | +This guide provides an overview of the infrastructure setup that is mandatory for both existing and new deployments using NF Runtime version 4.0.0. |
| 44 | + |
| 45 | +#### Step 1: Register NexusIdentity Resource Provider |
| 46 | + |
| 47 | +Register the **Microsoft.NexusIdentity** resource provider. |
| 48 | + |
| 49 | +1. Register the resource provider: |
| 50 | + |
| 51 | + ```Azure CLI |
| 52 | + az provider register --namespace Microsoft.NexusIdentity --wait |
| 53 | + ``` |
| 54 | + |
| 55 | +2. Verify the registration status: |
| 56 | + |
| 57 | + ```Azure CLI |
| 58 | + az provider show --namespace Microsoft.NexusIdentity -o table |
| 59 | + ``` |
| 60 | + |
| 61 | + The registration status should display as **"Registered"**. |
| 62 | + |
| 63 | +#### Step 2: Assign necessary permissions for Network Fabric access |
| 64 | + |
| 65 | +As part of the **Secure Future Initiative (SFI)**, **On-Behalf-Of (OBO) tokens** are now required to grant access to customer resources. This token grants NexusIdentity permissions scoped at the subscription, resource group, or network fabric level to enable **read access** to Network Fabric role assignments. The following role permissions should be assigned to end users responsible for NF create, NF upgrade, and NF delete operations. These permissions can be granted temporarily, limited to the duration required to perform these operations. |
| 66 | + |
| 67 | +##### Required permissions |
| 68 | + |
| 69 | +1. Microsoft.NexusIdentity/identitySets/read |
| 70 | +2. Microsoft.NexusIdentity/identitySets/write |
| 71 | +3. Microsoft.NexusIdentity/identitySets/delete |
| 72 | + |
| 73 | + |
| 74 | +##### Configure Azure RBAC for Network Fabric Runtime version 4.0.0 |
| 75 | + |
| 76 | +1. Under **Privileged Administrator Roles**, select **Azure RBAC Administrator** as the built-in role and click **Next**. |
| 77 | + |
| 78 | + :::image type="content" source="media/breakglass-role-assignment.png" alt-text="Screenshot of adding role-assignment"::: |
| 79 | + |
| 80 | +2. In the **Members** tab, add the identity of the user responsible for performing NF create, update, and delete operations. |
| 81 | + |
| 82 | + :::image type="content" source="media/breakglass-add-member-nexusidenitityrp.png" alt-text="Screenshot of adding member to role assignment"::: |
| 83 | + |
| 84 | +3. In the **Conditions** tab, select "Allow users to only assign selected roles to selected principals (fewer privileges). |
| 85 | + |
| 86 | + :::image type="content" source="media/breakglass-conditions-roles-assignment.png" alt-text="Screenshot of adding conditions to role assignment"::: |
| 87 | + |
| 88 | + - Select Constrain roles and principals and click Configure, |
| 89 | + |
| 90 | + - Select the following parameters: |
| 91 | + |
| 92 | + **Role:** Reader |
| 93 | + |
| 94 | + **Principal:** NexusIdentityRP |
| 95 | + |
| 96 | +:::image type="content" source="media/breakglass-constrain-roles-principals.png" alt-text="Screenshot of adding roles and principals"::: |
| 97 | + |
| 98 | +4. Click Review + Assign to finalize the configuration. |
| 99 | + |
| 100 | +5. Activate role |
| 101 | + |
| 102 | + - To activate the role, select **Role Based Access Control Administrator** from Eligible assignments tab. |
| 103 | + |
| 104 | +> [!NOTE] |
| 105 | +> Ensure that **Role Based Access Control Administrator** is sucessfully activated. |
| 106 | +
|
| 107 | +## Next Steps |
| 108 | + |
| 109 | +[How to use Method D v2.0 break-glass access](howto-use-break-glass-access.md) |
0 commit comments