Working with groups
ONTAP provides several options for configuring groups based on your authorization server. The groups can then be mapped to roles which are used by ONTAP to determine access.
How groups are identified
When you configure a group at an authorization server, it's identified and carried in an OAuth 2.0 access token using either a name or UUID. You need to be aware of how your authorization server handles groups before configuring ONTAP.
If multiple groups are included in an access token, ONTAP will attempt to use each one until there is a match. |
Group names
Many authorization servers identify and represent groups using a name. Here's a fragment of a JSON access token generated by Active Directory Federation Service (ADFS) containing several groups. See Manage groups with names for more information.
... "sub": "User1_TestDev@NICAD5.COM", "group": [ "NICAD5\\Domain Users", "NICAD5\\Development Group", "NICAD5\\Production Group" ], "apptype": "Confidential", "appid": "3bff3b2b-8e40-44ba-7c11-d73c3b76e3e8", ...
Group UUIDs
Some authorization servers identify and represent groups using a UUID. Here's a fragment of a JSON access token generated by Microsoft Entra ID containing several groups. See Manage groups with UUIDs for more information.
... "appid": "4aff4b4b-8e40-44ba-7c11-d73c3b76e3d7", "appidacr": "1", "groups": [ "8ea4c5b0-bcad-4e66-8f1e-cd395474a448", "a8558fc2-a1b2-4cb7-cc41-59bd831840cc"], "name": "admin007 with group membership", ...
Manage groups with names
If your authorization server uses names to identify groups, you need to make sure each group is defined to ONTAP. Depending on your security environment, you might already have the group defined.
Here's an example CLI command defining a group to ONTAP. Notice it's using a named group from the sample access token. You need to be at the ONTAP admin privilege level to issue the command.
security login create -user-or-group-name "NICAD5\\Domain Users" -application http -authentication-method domain -role admin
You can also configure this feature using the ONTAP REST API. See ONTAP Automation for more information. |
Manage groups with UUIDs
If your authorization server represents groups using UUID values, you need to perform a two-step configuration before using a group. Beginning with ONTAP 9.16.1, two mapping features are available and have been tested with Microsoft Entra ID. You need to be at the ONTAP admin privilege level to issue the CLI commands.
You can also configure these features using the ONTAP REST API. See the ONTAP Automation documentation site for more information. |
Map a group UUID to a group name
If you're using an authorization server that represents groups using UUID values, you need to map the group UUIDs to group names. The primary ONTAP CLI operations are described below.
Create
You can define a new group mapping configuration with the security login group create
command. The group UUID and name should match the configuration at the authorization server.
The parameters used to create a group mapping are described below.
Parameter | Description |
---|---|
|
Optionally specifies the name of the SVM (vserver) the group is associated with. If omitted, the group is associated with the ONTAP cluster. |
|
The unique name of the group that ONTAP will use. |
|
This value indicates the identity provider the group originates from. |
|
Specifies the universally unique identifier of the group as provided by the authorization server. |
Here's an example CLI command defining a group to ONTAP. Notice it's using a UUID group from the sample access token.
security login group create -vserver ontap-cls-1 -name IAM_Dev -type entra -uuid 8ea4c5b0-bcad-4e66-8f1e-cd395474a448
After creating the group, a unique read-only integer identifier is generated for the group.
Additional CLI operations
The command supports several additional operations, including:
-
Show
-
Modify
-
Delete
You can use the show
option to retrieve the unique group ID generated for a group. Refer to the ONTAP commands reference documentation for more information.
Map a group UUID to a role
If you're using an authorization server that represents groups using UUID values, you can map the group to a role. The primary ONTAP CLI operations are described below. Also, you need to be at the ONTAP admin privilege level to issue the commands.
You need to first Map a group UUID to a group name and retrieve the unique integer ID generated for the group. You'll need the ID to map the group to a role. |
Create
You can define a new role mapping with the security login group role-mapping create
command.
The parameters used to map a group to a role are described below.
Parameter | Description |
---|---|
|
Specifies the unique ID generated for the group using the command |
|
The name of the ONTAP role the group is mapped to. |
security login group role-mapping create -group-id 1 -role admin
Additional CLI operations
The command supports several additional operations, including:
-
Show
-
Modify
-
Delete
Refer to the ONTAP commands reference documentation for more information.