You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/operator-nexus/howto-set-up-break-glass-access.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,30 +17,30 @@ For Network Fabric environments, the current break-glass model, known as Method
17
17
18
18
-**Strict access control**: Customer administrators control access through individual assignments instead of shared accounts.
19
19
20
-
-**Strong authentication**: Break-glass access is managed via Microsoft Entra with Multi-Factor Authentication (MFA) eliminating local account dependencies.
20
+
-**Strong authentication**: Break-glass access is managed via Microsoft Entra with multifactor authentication (MFA) eliminating local account dependencies.
21
21
22
22
-**Enhanced security**: All access attempts are logged for audit and investigation purposes.
23
23
24
24
## FIDO2 token
25
25
26
-
In the Method D v2.0 model, break-glass users uses a FIDO2 token to create and upload a public key linked to their Entra identity. This provides secure SSH access to Fabric devices. Entra RBAC manages authorization, allowing administrators to assign appropriate access levels to users.
26
+
In the Method D v2.0 model, break-glass users uses a FIDO2 token to create and upload a public key linked to their Entra identity. This configuration provides secure SSH access to Fabric devices. Entra Role-Based Access Control (RBAC) manages authorization, allowing administrators to assign appropriate access levels to users.
27
27
28
28
For offline accessibility, usernames, public keys, and permissions are pre-provisioned on all the Network Fabric devices, allowing break-glass SSH login without requiring an active Azure connection.
29
29
30
-
Each FIDO2 token serves usually as a physical USB device, offering unphishable, multi-factor authentication through user presence and PIN verification.
30
+
Each FIDO2 token serves usually as a physical USB device, offering unphishable, multifactor authentication through user presence and PIN verification.
31
31
32
32
## Method D v2.0 setup and operations
33
33
34
34
This guide is divided into two sections
35
35
36
-
1. **Method D v2.0 infrastructure setup** - Mandatory for both existing and new NF deployments running Runtime Fabric version 4.0.0.
36
+
1. **Method D v2.0 infrastructure setup** - Mandatory for both existing and new Network Fabric (NF) deployments running Runtime Fabric version 4.0.0.
37
37
38
-
2.[**Using Method D v2.0 breakglass access**](howto-use-break-glass-access.md)
38
+
2.[**Using Method D v2.0 break glass access**](howto-use-break-glass-access.md)
39
39
40
40
41
41
### Method D v2.0 infrastructure setup
42
42
43
-
This guide provides an overview of the infrastructure setup mandatory for both existng and new deployments which will be using NF Runtime version 4.0.0.
43
+
This guide provides an overview of the infrastructure setup that is mandatory for both existing and new deployments using NF Runtime version 4.0.0.
Copy file name to clipboardExpand all lines: articles/operator-nexus/howto-use-break-glass-access.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -107,7 +107,7 @@ Once these roles are assigned, the corresponding username and public SSH key wil
107
107
> [!Note]
108
108
> break glass user accounts are reconciled every 4 hours. For immediate reconciliation, open a support ticket with the network fabric support team.
109
109
110
-
## 3. Break-glass access to Network Fabric device
110
+
## Break-glass access to Network Fabric device
111
111
112
112
Once permissions are granted, users can access network fabric devices with their FIDO-2 hardware token (for example, YubiKey). Follow the steps below to use break glass access.
0 commit comments