Skip to content

Commit c09cf8d

Browse files
committed
made changes
1 parent 8536636 commit c09cf8d

File tree

2 files changed

+12
-12
lines changed

2 files changed

+12
-12
lines changed

articles/operator-nexus/howto-setup-break-glass-access-.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -9,38 +9,38 @@ ms.date: 11/04/2024
99
ms.custom: template-how-to, devx-track-azurecli
1010
---
1111

12-
# Secure break-glass access
12+
# Set up Method D v2.0 secure break-glass access
1313

1414
The Break-Glass mechanism provides temporary and emergency access to Azure Operator Nexus devices or services, primarily for disaster recovery, incident response, or essential maintenance. Access is granted under controlled Identity Access Management (IAM) policies, maintaining security even during emergencies.
1515

16-
For Network Fabric environments, the current break-glass model, known as Method D v1.5, relies on shared password authentication. This model, however, is limited to 15 shared accounts and poses significant security risks. Method D v2.0 introduces a modernized approach, implementing FIDO-2 devices and SSH keys to secure break-glass access. Key improvements include:
16+
For Network Fabric environments, the current break-glass model, known as Method D v1.5, relies on password authentication. This model, however, is limited to 15 shared accounts and poses significant security risks. Method D v2.0 introduces a modernized approach, implementing FIDO-2 devices and SSH keys to secure break-glass access. Key improvements include:
1717

1818
- **Strict access control**: Customer administrators control access through individual assignments instead of shared accounts.
1919

20-
- **Strong authentication**: Break-glass access is managed via Microsoft Entra with Multi-Factor Authentication (MFA) and Single Sign-On (SSO), eliminating local account dependencies.
20+
- **Strong authentication**: Break-glass access is managed via Microsoft Entra with Multi-Factor Authentication (MFA) eliminating local account dependencies.
2121

22-
- **Enhanced security**: Unauthorized access attempts are logged for audit and investigation purposes.
22+
- **Enhanced security**: All access attempts are logged for audit and investigation purposes.
2323

2424
## FIDO2 token
2525

26-
In the Method D v2.0 model, break-glass users are issued a FIDO2 token to create and upload a public key linked to their Entra identity. This provides secure SSH access to Fabric devices. Entra RBAC manages authorization, allowing administrators to assign appropriate access levels to users or teams.
26+
In the Method D v2.0 model, break-glass users uses a FIDO2 token to create and upload a public key linked to their Entra identity. This provides secure SSH access to Fabric devices. Entra RBAC manages authorization, allowing administrators to assign appropriate access levels to users.
2727

28-
For offline accessibility, usernames, public keys, and permissions are pre-provisioned on all Fabric devices, allowing break-glass SSH login without requiring an active Azure connection.
28+
For offline accessibility, usernames, public keys, and permissions are pre-provisioned on all the Network Fabric devices, allowing break-glass SSH login without requiring an active Azure connection.
2929

30-
Each FIDO2 token serves as a physical USB device, typically with a fingerprint reader, offering unphishable, multi-factor authentication through user presence and PIN verification.
30+
Each FIDO2 token serves usually as a physical USB device, offering unphishable, multi-factor authentication through user presence and PIN verification.
3131

3232
## Method D v2.0 setup and operations
3333

3434
This guide is divided into two sections
3535

36-
1. **Method D V2.0 infrastructure setup** - Mandatory for both existing and new NF deployments running Runtime Fabric version 4.0.0.
36+
1. **Method D v2.0 infrastructure setup** - Mandatory for both existing and new NF deployments running Runtime Fabric version 4.0.0.
3737

38-
2. [**Using Method D V2.0 breakglass access**](howto-use-break-glass-access.md)
38+
2. [**Using Method D v2.0 breakglass access**](howto-use-break-glass-access.md)
3939

4040

41-
### MethodDV2 infrastructure setup
41+
### Method D v2.0 infrastructure setup
4242

43-
This guide provides an overview of the mandatory infrastructure setup for both existng and new environments using NF Runtime version 4.0.0.
43+
This guide provides an overview of the infrastructure setup mandatory for both existng and new deployments which will be using NF Runtime version 4.0.0.
4444

4545
#### Step 1: Register NexusIdentity Resource Provider
4646

articles/operator-nexus/howto-use-break-glass-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.date: 11/04/2024
99
ms.custom: template-how-to, devx-track-azurecli
1010
---
1111

12-
# Method D v2.0 Breakglass Access
12+
# Use Method D v2.0 Breakglass Access
1313
Breakglass access using Method D v2.0 is a streamlined approach for administrators to grant secure, emergency access to critical network fabric devices. This guide will walk you through setting up and using Breakglass access, including generating SSH keys, granting permissions, and accessing network fabric devices.
1414

1515
## Generating SSH Keys Using the Nexusidentity az CLI

0 commit comments

Comments
 (0)