Create accounts for FlexPod devices
To get started, set up accounts for FlexPod devices:
The agent uses these accounts to collect configuration information from each device.
Create a read-only account for Cisco UCS Manager
-
Log in to Cisco UCS Manager.
-
Create a locally authenticated user named csa-readonly.
All new users are read-only by default.
Create a read-only account for Nexus switches
-
Log in to each Nexus switch using SSH or Telnet.
-
Enter global configuration mode:
configure terminal .. Create a new user:
username [name] password [password] role network-operator .. Save the configuration:
copy running configuration startup configuration
If you are using a TACACS+ server and you need to grant CSA user privileges, go to Granting CSA user privileges using a TACACS+ server.
Create an admin account for ONTAP
-
Log in to OnCommand System Manager and click the settings icon:
. -
On the Users page, click Add.
-
Enter a user name and password and add ssh, ontapi and console as user login methods with admin access.

Create a read-only account for VMware
-
Log in to vCenter.
-
In the vCenter menu, choose Administration.
-
Under roles, choose Read-only.
-
Click the icon for Clone role action and change the name to CSA.
-
Select the newly created CSA role.
-
Click the Edit role icon.
-
Under Edit role, choose Global and then check Licenses.
-
On the sidebar, select Single sign on→Users and groups→Create a new user.
-
Name the new user CSARO under DOMAIN vpshere.local.
-
On the sidebar, select Global Permissions under Access Control.
-
Choose the user CSARO and assign ROLE CSA.
-
Log in to the Web Client.
Use user ID: CSARO@vsphere.local and previously created password.
Create a read-only account on the APIC
-
Click Admin.
-
Click Create new local users.
-
Under User Identity, enter the user information.
-
Under Security select all security domain options.
-
Click + to add user certificates and SSH keys if needed.
-
Click Next.
-
Click + to add roles for your domain.
-
Select the Role Name from the dropdown menu.
-
Select Read for the Role Privilege Type.
-
Click Finish.
Grant CSA user privileges using a TACACS+ server
If you are using a TACACS+ server and you need to grant CSA user privileges for your switches, you should create a user privilege group and grant the group access to the specific setup commands needed by CSA.
The following commands should be written into the configuration file for your TACACS+ server.
-
Enter the following to create a user privilege group with read-only access:
group=group_name {
default service=deny
service=exec{
priv-lvl=0
}
}
-
Enter the following to grant access to commands needed by CSA:
cmd=show {
permit "environment"
permit "version"
permit "feature"
permit "feature-set"
permit hardware.*
permit "interface"
permit "interface"
permit "interface transceiver"
permit "inventory"
permit "license"
permit "module"
permit "port-channel database"
permit "ntp peers"
permit "license usage"
permit "port-channel summary"
permit "running-config"
permit "startup-config"
permit "running-config diff"
permit "switchname"
permit "int mgmt0"
permit "cdp neighbors detail"
permit "vlan"
permit "vpc"
permit "vpc peer-keepalive"
permit "mac address-table"
permit "lacp port-channel"
permit "policy-map"
permit "policy-map system type qos"
permit "policy-map system type queuing"
permit "policy-map system type network-qos"
permit "zoneset active"
permit "san-port-channel summary"
permit "flogi database"
permit "fcns database detail"
permit "fcns database detail"
permit "zoneset active"
permit "vsan"
permit "vsan usage"
permit "vsan membership"
}
-
Enter the following to add your CSA user account to the newly created group:
user=user_account{
member=group_name
login=file/etc/passwd
}