Skip to content

Commit 869da55

Browse files
committed
Updates to indicate year expiration date for keysets.
1 parent 3cf6126 commit 869da55

File tree

2 files changed

+22
-22
lines changed

2 files changed

+22
-22
lines changed

articles/operator-nexus/howto-baremetal-bmc-ssh.md

Lines changed: 11 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -12,11 +12,11 @@ ms.custom: template-how-to, devx-track-azurecli
1212
# Manage emergency access to a bare metal machine using the `az networkcloud cluster bmckeyset`
1313

1414
> [!CAUTION]
15-
> Please note this process is used in emergency situations when all other troubleshooting options via Azure have been exhausted. SSH access to these bare metal machines is restricted to users managed via this method from the specified jump host list.
15+
> Please note this process is used in emergency situations when all other troubleshooting options via Azure are exhausted. SSH access to these bare metal machines is restricted to users managed via this method from the specified jump host list.
1616
17-
There are rare situations where a user needs to investigate & resolve issues with a bare metal machine and all other ways using Azure have been exhausted. Operator Nexus provides the `az networkcloud cluster bmckeyset` command so users can manage SSH access to the baseboard management controller (BMC) on these bare metal machines. On keyset creation, users are validated against Microsoft Entra ID for proper authorization by cross referencing the User Principal Name provided for a user against the supplied Azure Group ID `--azure-group-id <Entra Group ID>`.
17+
There are rare situations where a user needs to investigate & resolve issues with a bare metal machine and all other ways using Azure are exhausted. Operator Nexus provides the `az networkcloud cluster bmckeyset` command so users can manage SSH access to the baseboard management controller (BMC) on these bare metal machines. On keyset creation, users are validated against Microsoft Entra ID for proper authorization by cross referencing the User Principal Name provided for a user against the supplied Azure Group ID `--azure-group-id <Entra Group ID>`.
1818

19-
If the User Principal Name for a user isn't a member of the supplied group, the user's status is set to 'Invalid', and their status message will say "Invalid because userPrincipal isn't a member of AAD group." If the Azure Group ID is invalid, each user in the keyset has their status set to 'Invalid' and their status message will say "AAD group doesn't exist." Invalid users remain in the keyset but their key won't be enabled for SSH access.
19+
If the User Principal Name for a user isn't a member of the supplied group, the user's status is set to "Invalid." Additionally, their status message is set to "Invalid because userPrincipal isn't a member of Entra group." If the Azure Group ID is invalid, each user in the keyset has their status set to "Invalid" and their status message is set to "Entra group doesn't exist." Invalid users remain in the keyset but their key aren't for SSH access.
2020

2121
> [!NOTE]
2222
> There is currently a transitional period where specifying User Principal Names is optional. In a future release, it will become mandatory and Microsoft Entra ID validation will be enforced for all users. Users are encouraged to add User Principal Names to their keysets before the transitional period ends (planned for July 2024) to avoid keysets being invalidated. Note that if any User Principal Names are added to a keyset, even if they are not added for all users, Microsoft Entra ID validation will be enabled, and this will result in the entire keyset being invalidated if the Group ID specified is not valid.
@@ -35,7 +35,7 @@ The BMCs support a maximum number of 12 users. Users are defined on a per Cluste
3535
- To restrict access for managing keysets, create a custom role. For more information, see [Azure Custom Roles](../role-based-access-control/custom-roles.md). In this instance, add or exclude permissions for `Microsoft.NetworkCloud/clusters/bmcKeySets`. The options are `/read`, `/write`, and `/delete`.
3636

3737
> [!NOTE]
38-
> When BMC access is created, modified or deleted via the commands described in this
38+
> When BMC access is created, modified, or deleted via the commands described in this
3939
> article, a background process delivers those changes to the machines. This process is paused during
4040
> Operator Nexus software upgrades. If an upgrade is known to be in progress, you can use the `--no-wait`
4141
> option with the command to prevent the command prompt from waiting for the process to complete.
@@ -76,8 +76,9 @@ az networkcloud cluster bmckeyset create \
7676
--cluster-name [Required] : The name of the cluster.
7777
--expiration [Required] : The date and time after which the users
7878
in this key set are removed from
79-
the BMCs. The limit is up to 1 year from creation.
80-
Format is "YYYY-MM-DDTHH:MM:SS.000Z"
79+
the BMCs. The maximum expiration date is a
80+
year from creation date. Format is
81+
"YYYY-MM-DDTHH:MM:SS.000Z".
8182
--extended-location [Required] : The extended location of the cluster
8283
associated with the resource.
8384
Usage: --extended-location name=XX type=XX
@@ -208,14 +209,11 @@ az networkcloud cluster bmckeyset update \
208209
```azurecli
209210
--bmc-key-set-name --name -n [Required] : The name of the BMC key set.
210211
--cluster-name [Required] : The name of the cluster.
211-
--expiration : The date and time after which the users
212+
--expiration [Required] : The date and time after which the users
212213
in this key set are removed from
213-
the BMCs. Format is:
214-
"YYYY-MM-DDTHH:MM:SS.000Z"
215-
--jump-hosts-allowed : The list of IP addresses of jump hosts
216-
with management network access from
217-
which a login is allowed for the
218-
users. Supports IPv4 or IPv6 addresses.
214+
the BMCs. The maximum expiration date is a
215+
year from creation date. Format is
216+
"YYYY-MM-DDTHH:MM:SS.000Z".
219217
--privilege-level : The access level allowed for the users
220218
in this key set. Allowed values:
221219
"Administrator" or "ReadOnly".

articles/operator-nexus/howto-baremetal-bmm-ssh.md

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -12,11 +12,11 @@ ms.custom: template-how-to, devx-track-azurecli
1212
# Manage emergency access to a bare metal machine using the `az networkcloud cluster baremetalmachinekeyset`
1313

1414
> [!CAUTION]
15-
> Please note this process is used in emergency situations when all other troubleshooting options using Azure have been exhausted. SSH access to these bare metal machines is restricted to users managed via this method from the specified jump host list.
15+
> Please note this process is used in emergency situations when all other troubleshooting options using Azure are exhausted. SSH access to these bare metal machines is restricted to users managed via this method from the specified jump host list.
1616
17-
There are rare situations where a user needs to investigate & resolve issues with a bare metal machine and all other ways have been exhausted via Azure. Azure Operator Nexus provides the `az networkcloud cluster baremetalmachinekeyset` command so users can manage SSH access to these bare metal machines. On keyset creation, users are validated against Microsoft Entra ID for proper authorization by cross referencing the User Principal Name provided for a user against the supplied Microsoft Entra ID `--azure-group-id <Entra Group ID>`.
17+
There are rare situations where a user needs to investigate & resolve issues with a bare metal machine and all other ways via Azure are exhausted. Azure Operator Nexus provides the `az networkcloud cluster baremetalmachinekeyset` command so users can manage SSH access to these bare metal machines. On keyset creation, users are validated against Microsoft Entra ID for proper authorization by cross referencing the User Principal Name provided for a user against the supplied Microsoft Entra ID `--azure-group-id <Entra Group ID>`.
1818

19-
If the User Principal Name for a user isn't a member of the supplied group, the user's status is set to 'Invalid', and their status message will say "Invalid because userPrincipal isn't a member of AAD group." If the Azure Group ID is invalid, each user in the keyset will have their status set to 'Invalid' and their status message will say "AAD group doesn't exist." Invalid users remain in the keyset but their key won't be enabled for SSH access.
19+
If the User Principal Name for a user isn't a member of the supplied group, the user's status is set to "Invalid." Additionally, their status message reads "Invalid because userPrincipal isn't a member of Entra group." If the Azure Group ID is invalid, each user in the keyset has their status set to "Invalid" and their status message says "Entra group doesn't exist." Invalid users remain in the keyset but their key aren't enabled for SSH access.
2020

2121
> [!NOTE]
2222
> There is currently a transitional period where specifying User Principal Names is optional. In a future release, it will become mandatory and Microsoft Entra ID validation will be enforced for all users. Users are encouraged to add User Principal Names to their keysets before the transitional period ends (planned for July 2024) to avoid keysets being invalidated. Note that if any User Principal Names are added to a keyset, even if they are not added for all users, Microsoft Entra ID validation will be enabled, and this will result in the entire keyset being invalidated if the Group ID specified is not valid.
@@ -28,7 +28,7 @@ There's no limit to the number of users in a group.
2828
> [!CAUTION]
2929
> Notes for jump host IP addresses
3030
31-
- The keyset create/update process adds the jump host IP addresses to the IP tables for each machine in the Cluster. This restricts SSH access to be allowed only from those jump hosts.
31+
- The keyset create/update process adds the jump host IP addresses to the IP tables for each machine in the Cluster. The IP tables update restricts SSH access to be allowed only from those jump hosts.
3232
- It's important to specify the Cluster facing IP addresses for the jump hosts. These IP addresses might be different than the public facing IP address used to access the jump host.
3333
- Once added, users are able to access bare metal machines from any specified jump host IP including a jump host IP defined in another bare metal machine keyset group.
3434
- Existing SSH access remains when adding the first bare metal machine keyset. However, the keyset command limits an existing user's SSH access to the specified jump host IPs in the keyset commands.
@@ -43,7 +43,7 @@ There's no limit to the number of users in a group.
4343
- To restrict access for managing keysets, create a custom role. For more information, see [Azure Custom Roles](../role-based-access-control/custom-roles.md). In this instance, add or exclude permissions for `Microsoft.NetworkCloud/clusters/bareMetalMachineKeySets`. The options are `/read`, `/write`, and `/delete`.
4444

4545
> [!NOTE]
46-
> When bare metal machine access is created, modified or deleted via the commands described in this
46+
> When bare metal machine access is created, modified, or deleted via the commands described in this
4747
> article, a background process delivers those changes to the machines. This process is paused during
4848
> Operator Nexus software upgrades. If an upgrade is known to be in progress, you can use the `--no-wait`
4949
> option with the command to prevent the command prompt from waiting for the process to complete.
@@ -86,8 +86,9 @@ az networkcloud cluster baremetalmachinekeyset create \
8686
--cluster-name [Required] : The name of the cluster.
8787
--expiration [Required] : The date and time after which the users
8888
in this key set are removed from
89-
the bare metal machines. Format is:
90-
"YYYY-MM-DDTHH:MM:SS.000Z"
89+
the bare metal machines. The maximum
90+
expiration date is a year from creation
91+
date. Format is: "YYYY-MM-DDTHH:MM:SS.000Z".
9192
--extended-location [Required] : The extended location of the cluster
9293
associated with the resource.
9394
Usage: --extended-location name=XX type=XX
@@ -228,8 +229,9 @@ az networkcloud cluster baremetalmachinekeyset update \
228229
--cluster-name [Required] : The name of the cluster.
229230
--expiration : The date and time after which the users
230231
in this key set are removed from
231-
the bare metal machines. Format is:
232-
"YYYY-MM-DDTHH:MM:SS.000Z"
232+
the bare metal machines. The maximum
233+
expiration date is a year from creation
234+
date. Format is: "YYYY-MM-DDTHH:MM:SS.000Z".
233235
--jump-hosts-allowed : The list of IP addresses of jump hosts
234236
with management network access from
235237
which a login is allowed for the

0 commit comments

Comments
 (0)