Skip to content

Commit cb23601

Browse files
committed
Update howto-use-break-glass-access.md
1 parent 5196ac1 commit cb23601

File tree

1 file changed

+36
-0
lines changed

1 file changed

+36
-0
lines changed

articles/operator-nexus/howto-use-break-glass-access.md

Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,8 @@ ms.custom: template-how-to, devx-track-azurecli
1313

1414
Break glass access using Method D v2.0 is a streamlined approach for administrators to grant secure, emergency access to critical network fabric devices. This guide walks you through setting up and using break glass access, including generating SSH keys, granting permissions, and accessing network fabric devices.
1515

16+
Method D v2.0 also supports assigning roles to Entra Groups, streamlining the management of break glass access by leveraging group-based role assignments.
17+
1618
## Generating SSH Keys using the Nexusidentity Azure CLI
1719

1820
To start with break glass Identity and Access Management (IAM) configuration, you need to set up SSH keys using the Nexusidentity extension. Make sure you have the following prerequisites installed and updated.
@@ -31,6 +33,11 @@ To start with break glass Identity and Access Management (IAM) configuration, yo
3133
- **Microsoft Authentication Library (MSAL) version**: 1.31.2b1
3234
- **azure-mgmt-resource**: 23.1.1
3335

36+
### Prerequisites and Setup for Group-based role assignments
37+
38+
**Create Security Groups**: Define Entra security groups that include users requiring BreakGlass access.
39+
**Assign Roles to Groups**: Assign BreakGlass roles to security groups instead of individual users.
40+
3441
### Steps to install Nexusidentity extension and generate SSH keys
3542

3643
1. **Enabling long paths** (Windows OS only)
@@ -125,6 +132,19 @@ Once these roles are assigned, the corresponding username and public SSH key are
125132
> [!Note]
126133
> break glass user accounts are reconciled every 4 hours. For immediate reconciliation, open a support ticket with the network fabric support team.
127134
135+
## Scope for group based role assignments
136+
137+
Role assignments can be made at either the subscription or fabric scope. But these role assignments have been validated at the fabric level. Each user must have rights for the specific fabric instance, which may be inherited from higher-level grants (e.g., subscription-level assignments).
138+
139+
Multiple groups can be assigned the same NNF built-in role (e.g., Nexus Network Fabric Service Reader or Writer) for a given fabric instance.
140+
141+
### User Limitations
142+
A maximum of 200 user accounts (across all groups and individual assignments) can be granted BreakGlass access. This limit is subject to review in future releases.
143+
Multiple groups may be assigned the same role for a fabric instance, but the 200-user limit still applies.
144+
145+
> [!Note]
146+
> Nested groups are not supported. Only direct group memberships are considered.
147+
128148
## Break-glass access to Network Fabric device
129149
130150
Once permissions are granted, users can access network fabric devices with their FIDO-2 hardware token (for example, YubiKey). Follow these steps to use break glass access.
@@ -145,3 +165,19 @@ Once permissions are granted, users can access network fabric devices with their
145165

146166
> [!Note]
147167
> This command establishes a secure connection, using the jump server as an intermediary for authentication.
168+
169+
## Group based role assignment synchronization
170+
Upon assigning an Entra Group to a BreakGlass role, all users in that group will have the appropriate device access provisioned during the next synchronization cycle.
171+
172+
### Reconciliation Process
173+
174+
BreakGlass account reconciliation occurs every four hours and ensures alignment between Entra role assignments and device access:
175+
176+
- **User Removed from Group**: Device access will be revoked.
177+
178+
- **User Added to Group**: Appropriate device access will be provisioned.
179+
180+
- **Group Role Assignment Removed**: All users in the group will have their access revoked.
181+
182+
- **Failure to Resolve Group Membership**: If group membership cannot be verified (e.g., due to Entra API failures or connectivity issues), no changes will be made to existing device accounts.
183+

0 commit comments

Comments
 (0)