Roles, applications, and authentication
ONTAP provides the security-conscious enterprise with the ability to provide granular access to different administrators through different login applications and methods. This helps customers create a data centric zero-trust model.
These are the roles available for admin and storage virtual machine administrators. The login application methods and login authentication methods are specified.
Roles
With role-based access control (RBAC), users have access to only the systems and options required for their job roles and functions. The RBAC solution in ONTAP limits users' administrative access to the level granted for their defined role, which allows administrators to manage users by assigned role. ONTAP provides several predefined roles. Operators and administrators can create, modify, or delete custom access control roles, and they can specify account restrictions for specific roles.
Predefined roles for cluster administrators
This role… |
Has this level of access… |
To the following commands or command directories |
---|---|---|
|
All |
All command directories ( |
|
Read/Write |
|
Read only |
|
|
None |
|
|
|
All |
|
None |
All other command directories ( |
|
|
All |
|
Read only |
|
|
None |
All other command directories ( |
|
|
All |
|
None |
|
|
Read only |
All other command directories ( |
|
|
None |
All command directories ( |
The autosupport role is assigned to the predefined autosupport account, which is used by AutoSupport OnDemand. ONTAP prevents you from modifying or deleting the autosupport account. ONTAP also prevents you from assigning the autosupport role to other user accounts.
|
Predefined roles for storage virtual machine (SVM) administrators
Role name |
Capabilities |
---|---|
|
|
|
|
|
|
|
|
|
|
|
|
Application methods
The application method specifies the access type of the login method. Possible values include console, http, ontapi, rsh, snmp, service-processor, ssh,
and telnet
.
Setting this parameter to service-processor
grants the user access to the Service Processor. When this parameter is set to service-processor
, the -authentication-method
parameter must be set to password
because the Service Processor only supports password
authentication. SVM user accounts cannot access the Service Processor. Therefore, operators and administrators cannot use the -vserver
parameter when this parameter is set to service-processor
.
To further restrict access to the service-processor
use the command system service-processor ssh add-allowed-addresses
. The command system service-processor api-service
can be used to update the configurations and certificates.
For security reasons, Telnet and Remote Shell (RSH) are disabled by default because NetApp recommends Secure Shell (SSH) for secure remote access. If there is a requirement or unique need for Telnet or RSH, they must be enabled.
The security protocol modify
command modifies the existing cluster-wide configuration of RSH and Telnet. Enable RSH and Telnet in the cluster by setting the enabled field to true
.
Authentication methods
The authentication method parameter specifies the authentication method used for logins.
Authentication method | Description |
---|---|
|
SSL certificate authentication |
|
SNMP community strings |
|
Active Directory authentication |
|
LDAP or NIS authentication |
|
Password |
|
Public key authentication |
|
SNMP user security model |
The use of NIS is not recommended due to protocol security weaknesses. |
Beginning with ONTAP 9.3, chained two-factor authentication is available for local SSH admin
accounts using publickey
and password
as the two authentication methods. In addition to the -authentication-method
field in the security login
command, a new field named -second-authentication-method
has been added. Either publickey
or password
can be specified as the -authentication-method
or the -second-authentication-method
. However, during SSH authentication, the order is always publickey
with partial authentication, followed by the password prompt for full authentication.
[user@host01 ~]$ ssh ontap.netapp.local Authenticated with partial success. Password: cluster1::>
Beginning with ONTAP 9.4, nsswitch
can be used as a second authentication method with publickey
.
Beginning with ONTAP 9.12.1, FIDO2 can also be used for SSH authentication using a YubiKey hardware authentication device or other FIDO2 compatible devices.
Beginning with ONTAP 9.13.1:
-
domain
accounts can be used as a second authentication method withpublickey
. -
Time-based one-time password (
totp
) is a temporary passcode generated by an algorithm that uses the current time of day as one of its authentication factors for the second authentication method. -
Public key revocation is supported with SSH publickeys as well as certificates which will be checked for expiration/revocation during SSH.
For more information about multifactor authentication (MFA) for ONTAP System Manager, Active IQ Unified Manager, and SSH, see TR-4647: Multifactor Authentication in ONTAP 9.