Administrator Authentication and RBAC
Administrator Authentication and RBAC
Contents
Deciding whether to use the Administrator Authentication and RBAC Power Guide
........................................................................................................................................4
You can enable local administrator accounts to access an admin storage virtual machine (SVM) or
a data SVM with the following types of authentication:
• Password
• SSH public key
• SSL certificate
• SSH multifactor authentication (MFA)
Starting with ONTAP 9.3, authentication with password and public key is supported.
You can enable remote administrator accounts to access an admin SVM or a data SVM with the
following types of authentication:
• Active Directory
• SAML authentication (only for admin SVM)
Starting with ONTAP 9.3, Security Assertion Markup Language (SAML) authentication can be
used for accessing the admin SVM by using any of the following web services: Service
Processor Infrastructure, ONTAP APIs, or ONTAP System Manager.
• Starting with ONTAP 9.4, SSH MFA can be used for remote users on LDAP or NIS servers.
Authentication with nsswitch and public key is supported.
Administrator Authentication and RBAC Power Guide 6
Worksheets for administrator authentication and RBAC configuration
You provide these values with the security certificate install command when you
install a CA-signed digital certificate for use in authenticating the cluster or SVM as an SSL
server. Only the options that are relevant to this guide are shown in the following table.
You provide these values with the vserver active-directory create command when you
have not configured a CIFS server and you want to create an SVM computer account on the Active
Directory domain.
Note: Starting with ONTAP 9.2, the -ldap-servers field replaces the -servers field. This
new field can take either a host name or an IP address as the value for the LDAP server.
Only the options that are relevant to this guide are shown in the following table:
Administrator Authentication and RBAC Power Guide 11
Worksheets for administrator authentication and RBAC configuration
You provide these values with the vserver services name-service ldap create
command when you associate an LDAP client configuration with the SVM.
You provide these values with the vserver services name-service nis-domain create
command when you create an NIS domain configuration on an SVM.
Note: Starting with ONTAP 9.2, the -nis-servers field replaces the -servers field. This
new field can take either a host name or an IP address as the value for the NIS server.
Field Description Your value
-vserver The name of the SVM on which the
domain configuration is to be created.
-domain The name of the domain.
-active Whether the domain is active (true or
false).
You provide these values with the vserver services name-service ns-switch create
command when you specify the look-up order for name service sources.
Merged roles
If you enable multiple remote accounts for the same user, the user is assigned the union of all roles
specified for the accounts. That is, if an LDAP or NIS account is assigned the vsadmin role, and
the AD group account for the same user is assigned the vsadmin-volume role, the AD user logs
in with the more inclusive vsadmin capabilities. The roles are said to be merged.
Choices
• Enabling local account access on page 14
• Enabling Active Directory account access on page 17
• Enabling LDAP or NIS account access on page 18
• Configuring SAML authentication on page 19
The following command requires the SVM administrator account admin2 with the predefined
admin role to log in to the SVM engData1 with both an SSH public key and a user password:
Step
Enable local administrator accounts to access an SVM using an SSL certificate:
security login create -vserver SVM_name -user-or-group-name user_or_group_name -
application application -authmethod authentication_method -role role -comment comment
For complete command syntax, see the worksheet.
Creating or modifying login accounts on page 6
The following command enables the SVM administrator account svmadmin2 with the default
vsadmin role to access the SVM engData2 using an SSL digital certificate.
Step
Enable AD user or group administrator accounts to access an SVM:
security login create -vserver SVM_name -user-or-group-name user_or_group_name -
application application -authmethod domain -role role -comment comment
The following command enables the SVM administrator accounts in the AD group account
DOMAIN1\adgroup with the predefined vsadmin-volume role to access the SVM engData.
idp_uri is the FTP or HTTP address of the IdP host from where the IdP metadata can be
downloaded.
ontap_host_name is the host name or IP address of the SAML service provider host, which
in this case is the ONTAP system. By default, the IP address of the cluster-management LIF is
used.
You can optionally provide the ONTAP server certificate information. By default, the ONTAP
web server certificate information is used.
Administrator Authentication and RBAC Power Guide 20
Creating login accounts
Warning: This restarts the web server. Any HTTP/S connections that are active
will be disrupted.
Do you want to continue? {y|n}: y
[Job 179] Job succeeded: Access the SAML SP metadata using the URL:
https://10.63.56.150/saml-sp/Metadata
Configure the IdP and Data ONTAP users for the same directory server domain to ensure
that users are the same for different authentication methods. See the "security login
show" command for the Data ONTAP user configuration.
Any existing user that accesses the http or ontapi application is automatically configured for
SAML authentication.
4. If you want to create users for the http or ontapi application after SAML is configured,
specify SAML as the authentication method for the new users.
a. Create a login method for new users with SAML authentication:
security login create -user-or-group-name user_name -application [http | ontapi] -
authentication-method saml -vserver svm_name
Vserver: cluster_12
Second
User/Group Authentication Acct Authentication
Name Application Method Role Name Locked Method
-------------- ----------- ------------- ---------------- ------ --------------
admin console password admin no none
admin http password admin no none
admin http saml admin - none
admin ontapi password admin no none
admin ontapi saml admin - none
admin service-processor
password admin no none
admin ssh password admin no none
admin1 http password backup no none
admin1 http saml backup - none
Related information
ONTAP 9 commands
Administrator Authentication and RBAC Power Guide 21
Managing access-control roles
The following command changes the role of the SVM administrator accounts in the AD group
account DOMAIN1\adgroup to the custom vol_role role.
Step
Define a custom role:
security login role create -vserver SVM_name -role role -cmddirname
command_or_directory_name -access access_level -query query
cluster1::>security login role create -role vol_role -cmddirname "volume" -access all
The following commands grant the SVM_storage role read-only access to the commands in the
storage command directory, no access to the commands in the storage encryption
subdirectory, and full access to the storage aggregate plex offline nonintrinsic
command.
This role... Has this level of access... To the following commands or command directories
admin all All command directories (DEFAULT)
autosupport all • set
• system node autosupport
readonly volume
none security
Note: The autosupport role is assigned to the predefined autosupport account, which is
used by AutoSupport OnDemand. ONTAP prevents you from modifying or deleting the
autosupport account. ONTAP also prevents you from assigning the autosupport role to
other user accounts.
vsadmin-protocol • Managing own user account local password and key information
• Configuring protocols: NFS, CIFS, iSCSI, and FC, including FCoE
• Configuring services: DNS, LDAP, and NIS
• Managing LUNs
• Monitoring network interface
• Monitoring the health of the SVM
vsadmin-backup • Managing own user account local password and key information
• Managing NDMP operations
• Making a restored volume read/write
• Managing SnapMirror relationships and Snapshot copies
• Viewing volumes and network information
vsadmin-snaplock • Managing own user account local password and key information
• Managing volumes, except volume moves
• Managing quotas, qtrees, Snapshot copies, and files
• Performing SnapLock operations, including privileged delete
• Configuring protocols: NFS and CIFS
• Configuring services: DNS, LDAP, and NIS
• Monitoring jobs
• Monitoring network connections and network interface
vsadmin-readonly • Managing own user account local password and key information
• Monitoring the health of the SVM
• Monitoring network interface
• Viewing volumes and LUNs
• Viewing services and protocols
Administrator Authentication and RBAC Power Guide 25
Managing administrator accounts
security login publickey create -vserver SVM_name -username user_name -index index -
publickey certificate -comment comment
For complete command syntax, see the worksheet.
Associating a public key with a user account on page 8
The following command associates a public key with the SVM administrator account svmadmin1
for the SVM engData1. The public key is assigned index number 5.
The following command creates a CSR with a 2048-bit private key generated by the SHA256
hashing function for use by the Software group in the IT department of a company whose
custom common name is server1.companyname.com, located in Sunnyvale,
California, USA. The email address of the SVM contact administrator is
[email protected]. The system displays the CSR and the private key in the output.
Private Key :
-----BEGIN RSA PRIVATE KEY-----
MIIBOwIBAAJBAPXFanNoJApT1nzSxOcxixqImRRGZCR7tVmTYyqPSuTvfhVtwDJb
mXuj6U3a1woUsb13wfEvQnHVFNci2ninsJ8CAwEAAQJAWt2AO+bW3FKezEuIrQlu
KoMyRYK455wtMk8BrOyJfhYsB20B28eifjJvRWdTOBEav99M7cEzgPv+p5kaZTTM
gQIhAPsp+j1hrUXSRj979LIJJY0sNez397i7ViFXWQScx/ehAiEA+oDbOooWlVvu
xj4aitxVBu6ByVckYU8LbsfeRNsZwD8CIQCbZ1/ENvmlJ/P7N9Exj2NCtEYxd0Q5
cwBZ5NfZeMBpwQIhAPk0KWQSLadGfsKO077itF+h9FGFNHbtuNTrVq4vPW3nAiAA
peMBQgEv28y2r8D4dkYzxcXmjzJluUSZSZ9c/wS6fA==
-----END RSA PRIVATE KEY-----
Note: Please keep a copy of your certificate request and private key for future
reference.
2. Copy the certificate request from the CSR output, and send it in electronic form (such as email)
to a trusted third-party CA for signing.
After processing your request, the CA sends you the signed digital certificate. You should keep
a copy of the private key and the CA-signed digital certificate.
The following command installs the CA-signed server certificate and intermediate certificates on
the SVM engData2.
-----END CERTIFICATE-----
You should keep a copy of the private key and the CA-signed digital certificate for
future reference.
The following command configures the CIFS-enabled data SVM engData as an authentication
tunnel.
In order to create an Active Directory machine account, you must supply the name and
password of a Windows account with sufficient privileges to add computers to the
"CN=Computers" container within the "example.com" domain.
Administrator Authentication and RBAC Power Guide 30
Managing administrator accounts
Note: Start TLS is supported for access to data SVMs only. It is not supported for access to
admin SVMs.
Note: Starting in ONTAP 9.2, the field -ldap-servers replaces the field -servers. This
new field can take either a hostname or an IP address for the LDAP server.
2. Associate the LDAP client configuration with the SVM:
vserver services name-service ldap create -vserver SVM_name -client-config
client_configuration -client-enabled true|false
For complete command syntax, see the worksheet.
Configuring LDAP or NIS server access on page 10
The following command associates the LDAP client configuration corp with the SVM
engData, and enables the LDAP client on the SVM.
Note: Starting in ONTAP 9.2, the vserver services name-service ldap create
command performs an automatic configuration validation and reports an error message if
ONTAP is unable to contact the name server.
3. Validate the status of the name servers by using the vserver services name-service ldap check
command.
The following command validates LDAP servers on the SVM vs0.
| Vserver: vs0 |
| Client Configuration Name: c1 |
| LDAP Status: up |
| LDAP Status Details: Successfully connected to LDAP server
"10.11.12.13". |
Step
Change an administrator password:
security login password -vserver SVM_name -username user_name
The following command changes the password of the administrator admin1 for the SVM
vs1.example.com. You are prompted to enter the current password, then enter and reenter the
new password.
The following command locks the administrator account admin1 for the SVM
vs1.example.com:
The following command unlocks the administrator account admin1 for the SVM
vs1.example.com:
Steps
1. Migrate the MD5 administrator accounts to the SHA-512 password hash function:
a. Expire all MD5 administrator accounts:
security login expire-password -vserver * -username * -hash-function md5
Doing so forces MD5 account users to change their passwords upon next login.
b. Ask users of MD5 accounts to log in through a console or SSH session.
The system detects that the accounts are expired and prompts users to change their
passwords. SHA-512 is used by default for the changed passwords.
2. Optional: For MD5 accounts whose users do not log in to change their passwords within a
period of time, force the account migration:
a. Lock accounts that still use the MD5 hash function (advanced privilege level):
security login expire-password -vserver * -username * -hash-function md5 -lock-after
integer
After the number of days specified by -lock-after, users cannot access their MD5
accounts.
b. Unlock the accounts when the users are ready to change their passwords:
security login unlock -vserver vserver_name -username user_name
c. Have users log in to their accounts through a console or SSH session and change their
passwords when the system prompts them to do so.
Administrator Authentication and RBAC Power Guide 36
Where to find additional information
Copyright
Copyright © 2021 NetApp, Inc. All rights reserved. Printed in the U.S.
No part of this document covered by copyright may be reproduced in any form or by any means—
graphic, electronic, or mechanical, including photocopying, recording, taping, or storage in an
electronic retrieval system—without prior written permission of the copyright owner.
Software derived from copyrighted NetApp material is subject to the following license and
disclaimer:
THIS SOFTWARE IS PROVIDED BY NETAPP "AS IS" AND WITHOUT ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE,
WHICH ARE HEREBY DISCLAIMED. IN NO EVENT SHALL NETAPP BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
NetApp reserves the right to change any products described herein at any time, and without notice.
NetApp assumes no responsibility or liability arising from the use of products described herein,
except as expressly agreed to in writing by NetApp. The use or purchase of this product does not
convey a license under any patent rights, trademark rights, or any other intellectual property rights
of NetApp.
The product described in this manual may be protected by one or more U.S. patents, foreign
patents, or pending applications.
Data contained herein pertains to a commercial item (as defined in FAR 2.101) and is proprietary
to NetApp, Inc. The U.S. Government has a non-exclusive, non-transferrable, non-sublicensable,
worldwide, limited irrevocable license to use the Data only in connection with and in support of
the U.S. Government contract under which the Data was delivered. Except as provided herein, the
Data may not be used, disclosed, reproduced, modified, performed, or displayed without the prior
written approval of NetApp, Inc. United States Government license rights for the Department of
Defense are limited to those rights identified in DFARS clause 252.227-7015(b).
Trademark
NETAPP, the NETAPP logo, and the marks listed on the NetApp Trademarks page are trademarks
of NetApp, Inc. Other company and product names may be trademarks of their respective owners.
https://www.netapp.com/company/legal/trademarks/
Machine translation
See important information about localized content at netapp.com.
https://www.netapp.com/company/legal/machine-translation/