HP Brocade 8/12c Fabric OS Encryption Administrator's Guide - Page 133

Command RBAC permissions and AD types

Page 133 highlights

Command RBAC permissions and AD types 3 Command RBAC permissions and AD types Two RBAC roles are permitted to perform Encryption operations. • Admin and SecurityAdmin Users authenticated with the Admin and SecurityAdmin RBAC roles may perform cryptographic functions assigned to the FIPS Crypto Officer, including the following: • Perform encryption node initialization. • Enable cryptographic operations. • Manage I/O functions for critical security parameters (CSPs). • Zeroize encryption CSPs. • Register and configure a key vault. • Configure a recovery share policy. • Create and register recovery share. • Perform encryption group- and clustering-related operations. • Manage keys, including creation, recovery, and archive functions. • Admin and FabricAdmin Users authenticated with the Admin and FabricAdmin RBAC roles may perform routine Encryption Switch management functions, including the following: • Configure virtual devices and crypto LUNs. • Configure LUN and tape associations. • Perform re-keying operations. • Perform firmware download. • Perform regular Fabric OS management functions. See Table 4 for the RBAC permissions when using the encryption configuration commands. TABLE 4 Encryption command RBAC availability and admin domain type1 Command name User Admin Operator Switch Zone Fabric Admin Admin Admin addmembernode addhaclustermember addinitiator addLUN commit create --container create --encgroup create --hacluster create --tapepool N OM N N N O N OM N N N OM N OM N N N OM N OM N N N OM N OM N N N OM N OM N N N OM N OM N N N O N OM N N N OM N OM N N N OM Basic Switch Admin N N N N N N N N N Security Admin Domain Admin OM Disallowed O Disallowed O Disallowed O Disallowed O Disallowed O Disallowed OM Disallowed O Disallowed O Disallowed Fabric OS Encryption Administrator's Guide 113 53-1002159-03

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282

Fabric OS Encryption Administrator’s Guide
113
53-1002159-03
Command RBAC permissions and AD types
3
Command RBAC permissions and AD types
Two RBAC roles are permitted to perform Encryption operations.
Admin and SecurityAdmin
Users authenticated with the
Admin and SecurityAdmin RBAC
roles may perform cryptographic
functions assigned to the FIPS Crypto Officer, including the following:
Perform encryption node initialization.
Enable cryptographic operations.
Manage I/O functions for critical security parameters (CSPs).
Zeroize encryption CSPs.
Register and configure a key vault.
Configure a recovery share policy.
Create and register recovery share.
Perform encryption group- and clustering-related operations.
Manage keys, including creation, recovery, and archive functions.
Admin and FabricAdmin
Users authenticated with the
Admin and FabricAdmin RBAC
roles may perform routine
Encryption Switch management functions, including the following:
Configure virtual devices and crypto LUNs.
Configure LUN and tape associations.
Perform re-keying operations.
Perform firmware download.
Perform regular Fabric OS management functions.
See
Table 4
for the RBAC permissions when using the encryption configuration commands.
TABLE 4
Encryption command RBAC availability and admin domain type
1
Command name
User
Admin
Operator
Switch
Admin
Zone
Admin
Fabric
Admin
Basic
Switch
Admin
Security
Admin
Admin Domain
addmembernode
N
OM
N
N
N
O
N
OM
Disallowed
addhaclustermember
N
OM
N
N
N
OM
N
O
Disallowed
addinitiator
N
OM
N
N
N
OM
N
O
Disallowed
addLUN
N
OM
N
N
N
OM
N
O
Disallowed
commit
N
OM
N
N
N
OM
N
O
Disallowed
create --container
N
OM
N
N
N
OM
N
O
Disallowed
create --encgroup
N
OM
N
N
N
O
N
OM
Disallowed
create --hacluster
N
OM
N
N
N
OM
N
O
Disallowed
create --tapepool
N
OM
N
N
N
OM
N
O
Disallowed