You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> This guide has been validated with Opengear firmware version 24.07.1.
25
+
> This guide has been validated with Opengear firmware version 24.07.1, which was upgraded from version 22.06.0, and is supported with Nexus Network Fabric runtime version 4.0.0.
26
+
> Validation for compatibility with Nexus Network Fabric runtime version 5.0.0 is ongoing as part of the Nexus Network Fabric 8.0 release testing.
Copy file name to clipboardExpand all lines: articles/operator-nexus/howto-use-break-glass-access.md
+20-9Lines changed: 20 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ Break glass access using Method D v2.0 is a streamlined approach for administrat
15
15
16
16
## Generating SSH Keys using the Nexusidentity Azure CLI
17
17
18
-
To start with break glass IAM configuration, you need to set up SSH keys using the Nexusidentity extension. Make sure you have the following prerequisites installed and updated.
18
+
To start with break glass Identity and Access Management (IAM) configuration, you need to set up SSH keys using the Nexusidentity extension. Make sure you have the following prerequisites installed and updated.
19
19
20
20
### Prerequisites
21
21
@@ -26,31 +26,42 @@ To start with break glass IAM configuration, you need to set up SSH keys using t
26
26
-**Azure CLI**: Version 2.61 or higher (64-bit)
27
27
-**Nexusidentity Extension**: This extension must be added to Azure CLI.
28
28
-**YubiKey Firmware Version**: Must be 5.2.3 or higher.
29
+
-**Enable Long paths** - Windows long paths support must be enabled [Refer](https://pip.pypa.io/warnings/enable-long-paths).
29
30
30
31
### Steps to Install Nexusidentity Extension and Generate SSH Keys
31
32
32
-
1.**Open PowerShell**:
33
+
1.**Enabling long paths**
34
+
35
+
- Run the following PowerShell as an administrator.
- Run the following command to update Azure CLI to the latest version:
40
51
41
52
```Azure CLI
42
53
az upgrade
43
54
```
44
55
45
-
3. **Install Nexusidentity extension**:
56
+
4. **Install Nexusidentity extension**:
46
57
47
58
- To add the Nexusidentity extension
48
59
49
60
```Azure CLI
50
61
az extension add --name nexusidentity
51
62
```
52
63
53
-
4. **Generate SSH Keys with Nexusidentity extension**:
64
+
5. **Generate SSH Keys with Nexusidentity extension**:
54
65
55
66
a. Download the [Yubico Key Manager](https://www.yubico.com/support/download/yubikey-manager) to reset your YubiKey for initial setup.
56
67
@@ -69,7 +80,7 @@ To start with break glass IAM configuration, you need to set up SSH keys using t
69
80
```
70
81
71
82
> [!NOTE]
72
-
> Method Dv2.0 passkeys requires the YubiKey hardware token with a firmware version of 5.2.3 or higher.
83
+
> Method Dv2.0 passkeys require the YubiKey hardware token with a firmware version of 5.2.3 or higher.
73
84
74
85
e. During this process:
75
86
@@ -103,7 +114,7 @@ To enable break glass access, administrator can assign below roles to Entra user
103
114
104
115
- Allows show commands and commands to modify the running configuration.
105
116
106
-
Once these roles are assigned, the corresponding username and public SSH key will be automatically provisioned across all devices within the designated fabric instance.
117
+
Once these roles are assigned, the corresponding username and public SSH key are automatically provisioned across all devices within the designated fabric instance.
107
118
108
119
> [!Note]
109
120
> If a subscription owner assigns an user, the Network Fabric Service Reader or Writer role at the subscription scope, this role assignment will be inherited by all Network Fabric instances. Consequently, the user will be granted the privileges associated with the built-in role across all Network Fabric instances.
@@ -113,15 +124,15 @@ Once these roles are assigned, the corresponding username and public SSH key wil
113
124
114
125
## Break-glass access to Network Fabric device
115
126
116
-
Once permissions are granted, users can access network fabric devices with their FIDO-2 hardware token (for example, YubiKey). Follow the steps below to use break glass access.
127
+
Once permissions are granted, users can access network fabric devices with their FIDO-2 hardware token (for example, YubiKey). Follow these steps to use break glass access.
117
128
118
129
1. **Prepare for access**:
119
130
120
131
- Make sure your **FIDO-2 hardware token** is plugged into your computer.
121
132
122
133
2. **Use SSH with the `-J` option**:
123
134
124
-
- The `-J` option enables you to log in through a jump server and access a fabric device directly. This involves authentication first with the jump server and then with the fabric device (using ssh keys).
135
+
- The `-J` option enables you to log in through a jump server and access a fabric device directly. This process involves authentication first with the jump server and then with the fabric device using SSH keys.
125
136
126
137
Use the following command format to access a fabric device:
0 commit comments