Skip to content

Commit 836d3f5

Browse files
authored
Merge pull request #4 from AnejaAmit/patch-4
Update concepts-identity.md
2 parents 798d76b + 8d92889 commit 836d3f5

File tree

1 file changed

+15
-21
lines changed

1 file changed

+15
-21
lines changed

articles/azure-vmware/concepts-identity.md

Lines changed: 15 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -149,7 +149,16 @@ Unlike on-prem deployment, not all pre-defined NSX-T RBAC roles are supported wi
149149
> [!NOTE]
150150
> NSX-T LDAP Integration supported only with SDDC’s with NSX-T “cloudadmin” user.
151151
152-
### Supported NSX-T RBAC roles
152+
### Supported and Unsupported NSX-T RBAC roles
153+
154+
In an Azure VMware Solution deployment, the following NSX-T predefined RBAC roles are supported with LDAP integration:
155+
156+
- Auditor
157+
- Cloudadmin
158+
- LB Admin
159+
- LB Operator
160+
- VPN Admin
161+
- Network Operator
153162

154163
In an Azure VMware Solution deployment, the following NSX-T predefined RBAC roles are not supported with LDAP integration:
155164

@@ -158,25 +167,10 @@ Unlike on-prem deployment, not all pre-defined NSX-T RBAC roles are supported wi
158167
- Netx Partner Admin
159168
- GI Partner Admin
160169

161-
Currently these roles can be assigned to LDAP users on a software defined data center (SDDC) using “admin” user. However, this isn't supported with newer SDDC with “cloudadmin” user, as these roles have higher permissions for some NSX-T features than the “cloudadmin” user. NSX-T only allows users to assign RBAC roles with permissions lesser than or equal to their current role.
162-
163-
We recommend that you not use these RBAC roles with NSX-T to avoid breaking operational workflow for customers. Microsoft plans to swap the “admin” user with more restricted “cloudadmin” user for the existing SDDC. Instead, create and assign the following custom role that matches with the most common NSX RBAC roles requirement: Azure VMware Solution Enterprise Admin, Azure VMware Solution Network Admin, or Azure VMware Solution Security Admin.
164-
165-
#### Create “AVS Enterprise Admin” role
166-
167-
The customer can use a built-in CloudAdmin role or use the following steps to create this custom role.
168-
169-
1. Navigate to **System** > **Users and Roles** > **Roles**.
170-
1. Clone **Enterprise Admin** and provide the name, **AVS Enterprise Admin**.
171-
1. **Modify** the permissions as seen in the **Permission** column for some of the features as shown in the following table.
170+
You can create custom roles in NSX-T with permissions lesser than or equal to Cloudadmin role created by Microsoft. Following are examples on how to create a supported "Network Admin" and "Security Admin" role.
172171

173-
| Category | Subcategory | Feature | Permission |
174-
|-----------------|-----------------------|----------------------------------------------------------------------|------------------------------------------------------------------|
175-
| Networking<br><br><br> | Connectivity<br><br>Network Services | Tier-0 Gateways<br> Tier-0 Gateways > OSPF<br>Forwarding Policy | Read-only<br>None<br>None | |
176-
| Security<br><br><br> | Network Introspection<br>Endpoint Protection<br>Settings | <br><br>Service profiles | None<br>None<br>None |
177-
| System<br><br> | Backup and Restore<br>Settings | <br>License configuration | Read-only<br>None |
178-
179-
1. **Apply** the changes and **Save** the Role.
172+
> [!NOTE]
173+
> Custom role creation will fail if you assign a permission not allowed by Cloudadmin role.
180174
181175
#### Create “AVS Network Admin” role
182176

@@ -186,7 +180,7 @@ The customer can use a built-in CloudAdmin role or use the following steps to cr
186180

187181
1. Clone **Network Admin** and provide the name, **AVS Network Admin**.
188182

189-
1. **Modify** the permissions as seen in the **Permission** column for some of the features as shown in the following table.
183+
1. **Modify** the following permissions to "Read Only" or "None" as seen in the **Permission** column in the following table.
190184

191185
| Category | Subcategory | Feature | Permission |
192186
|-----------------|-----------------------|----------------------------------------------------------------------|------------------------------------------------------------------|
@@ -202,7 +196,7 @@ The customer can use a built-in CloudAdmin role or use the following steps to cr
202196

203197
1. Clone **Security Admin** and provide the name, “AVS Security Admin”.
204198

205-
1. **Modify** the permissions as seen in the **Permission** column for some of the features as shown in the following table.
199+
1. **Modify** the following permissions to "Read Only" or "None" as seen in the **Permission** column in the following table.
206200

207201
| Category | Subcategory | Feature | Permission |
208202
|-----------------|-----------------------|----------------------------------------------------------------------|------------------------------------------------------------------|

0 commit comments

Comments
 (0)