You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-vmware/concepts-identity.md
+15-21Lines changed: 15 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -149,7 +149,16 @@ Unlike on-prem deployment, not all pre-defined NSX-T RBAC roles are supported wi
149
149
> [!NOTE]
150
150
> NSX-T LDAP Integration supported only with SDDC’s with NSX-T “cloudadmin” user.
151
151
152
-
### Supported NSX-T RBAC roles
152
+
### Supported and Unsupported NSX-T RBAC roles
153
+
154
+
In an Azure VMware Solution deployment, the following NSX-T predefined RBAC roles are supported with LDAP integration:
155
+
156
+
- Auditor
157
+
- Cloudadmin
158
+
- LB Admin
159
+
- LB Operator
160
+
- VPN Admin
161
+
- Network Operator
153
162
154
163
In an Azure VMware Solution deployment, the following NSX-T predefined RBAC roles are not supported with LDAP integration:
155
164
@@ -158,25 +167,10 @@ Unlike on-prem deployment, not all pre-defined NSX-T RBAC roles are supported wi
158
167
- Netx Partner Admin
159
168
- GI Partner Admin
160
169
161
-
Currently these roles can be assigned to LDAP users on a software defined data center (SDDC) using “admin” user. However, this isn't supported with newer SDDC with “cloudadmin” user, as these roles have higher permissions for some NSX-T features than the “cloudadmin” user. NSX-T only allows users to assign RBAC roles with permissions lesser than or equal to their current role.
162
-
163
-
We recommend that you not use these RBAC roles with NSX-T to avoid breaking operational workflow for customers. Microsoft plans to swap the “admin” user with more restricted “cloudadmin” user for the existing SDDC. Instead, create and assign the following custom role that matches with the most common NSX RBAC roles requirement: Azure VMware Solution Enterprise Admin, Azure VMware Solution Network Admin, or Azure VMware Solution Security Admin.
164
-
165
-
#### Create “AVS Enterprise Admin” role
166
-
167
-
The customer can use a built-in CloudAdmin role or use the following steps to create this custom role.
168
-
169
-
1. Navigate to **System** > **Users and Roles** > **Roles**.
170
-
1. Clone **Enterprise Admin** and provide the name, **AVS Enterprise Admin**.
171
-
1.**Modify** the permissions as seen in the **Permission** column for some of the features as shown in the following table.
170
+
You can create custom roles in NSX-T with permissions lesser than or equal to Cloudadmin role created by Microsoft. Following are examples on how to create a supported "Network Admin" and "Security Admin" role.
0 commit comments