Role-based access control in SnapCenter
SnapCenter role-based access control (RBAC) and ONTAP permissions enable SnapCenter administrators to delegate control of SnapCenter resources to different users or groups of users. This centrally managed access empowers application administrators to work securely within delegated environments.
You can create and modify roles, and add resource access to users any time. However, when you are setting up SnapCenter for the first time, you should at least add Active Directory users or group to roles, and then add resource access to those users or groups.
|
You cannot use SnapCenter to create user or group accounts. You should create user or group accounts in Active Directory of the operating system or database. |
Types of RBAC in SnapCenter
SnapCenter uses the following types of role-based access control:
-
SnapCenter RBAC
-
Application-level RBAC
-
SnapCenter plug-in for VMware vSphere RBAC
-
ONTAP permissions
SnapCenter RBAC
SnapCenter has predefined roles and you can assign users or groups of users to these roles. The predefined roles are:
-
SnapCenter Admin role
-
App Backup and Clone Admin role
-
Backup and Clone Viewer role
-
Infrastructure Admin role
When you assign a role to a user, only jobs that are relevant to that user are visible in the Jobs page unless you assigned the SnapCenterAdmin role.
You can also create new roles and manage permissions and users. You can assign permissions to users or groups to access SnapCenter objects such as hosts, storage connections, and resource groups.
You can assign RBAC permissions to users and groups within the same forest and to users belonging to different forests. You cannot assign RBAC permissions to users belonging to nested groups across forests.
|
If you create a custom role, it must contain all of the permissions of the SnapCenterAdmin role. If you only copy some of the permissions, for example, Host add or Host remove, you cannot perform those operations. |
Users are required to provide authentication during login, through the graphical user interface (GUI) or using PowerShell cmdlets. If users are members of more than one role, after entering login credentials, they are prompted to specify the role they want to use. Users are also required to provide authentication to run the APIs.
Application-level RBAC
SnapCenter uses credentials to verify that authorized SnapCenter users also have application-level permissions.
For example, if you want to perform data protection operations in a SQL Server environment, you must set credentials with the proper Windows or SQL credentials. The SnapCenter Server authenticates the credentials set using either method. If you want to perform data protection operations in a Windows file system environment on ONTAP storage, the SnapCenter admin role must have admin privileges on the Windows host.
Similarly, if you want to perform data protection operations on an Oracle database and if the operating system (OS) authentication is disabled in the database host, you must set credentials with the Oracle database or Oracle ASM credentials. The SnapCenter Server authenticates the credentials set using one of these methods depending on the operation.
SnapCenter Plug-in for VMware vSphere RBAC
If you are using the SnapCenter VMware plug-in for VM-consistent data protection, the vCenter Server provides an additional level of RBAC. The SnapCenter VMware plug-in supports both vCenter Server RBAC and ONTAP RBAC. Learn More
Best Practice: NetApp recommends that you create one ONTAP role for SnapCenter Plug-in for VMware vSphere operations and assign it all the required privileges. |
ONTAP permissions
You should create vsadmin account with required permissions to access the storage system. Learn More
Permissions assigned to the pre-defined SnapCenter roles
When you add a user to a role, you must assign either the StorageConnection permission to enable storage virtual machine (SVM) communication, or assign an SVM to the user to enable permission to use the SVM. The Storage Connection permission enables users to create SVM connections.
For example, a user with the SnapCenter Admin role can create SVM connections and assign them to a user with the App Backup and Clone Admin role, which by default does not have permission to create or edit SVM connections. Without an SVM connection, users cannot complete any backup, clone, or restore operations.
SnapCenter Admin role
The SnapCenter Admin role has all permissions enabled. You cannot modify the permissions for this role. You can add users and groups to the role or remove them.
App Backup and Clone Admin role
The App Backup and Clone Admin role has the permissions required to perform administrative actions for application backups and clone-related tasks. This role does not have permissions for host management, provisioning, storage connection management, or remote installation.
Permissions | Enabled | Create | Read | Update | Delete |
---|---|---|---|---|---|
Resource Group |
Not applicable |
Yes |
Yes |
Yes |
Yes |
Policy |
Not applicable |
Yes |
Yes |
Yes |
Yes |
Backup |
Not applicable |
Yes |
Yes |
Yes |
Yes |
Host |
Not applicable |
Yes |
Yes |
Yes |
Yes |
Storage Connection |
Not applicable |
No |
Yes |
No |
No |
Clone |
Not applicable |
Yes |
Yes |
Yes |
Yes |
Provision |
Not applicable |
No |
Yes |
No |
No |
Dashboard |
Yes |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Reports |
Yes |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Restore |
Yes |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Resource |
Yes |
Yes |
Yes |
Yes |
Yes |
Plug-in Install/Uninstall |
No |
Not applicable |
Not applicable |
Not applicable |
|
Migration |
No |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Mount |
Yes |
Yes |
Not applicable |
Not applicable |
Not applicable |
Unmount |
Yes |
Yes |
Not applicable |
Not applicable |
Not applicable |
Full Volume Restore |
No |
No |
Not applicable |
Not applicable |
Not applicable |
SecondaryProtection |
No |
No |
Not applicable |
Not applicable |
Not applicable |
Job Monitor |
Yes |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Backup and Clone Viewer role
The Backup and Clone Viewer role has read-only view of all permissions. This role also has permissions enabled for discovery, reporting, and access to the Dashboard.
Permissions | Enabled | Create | Read | Update | Delete |
---|---|---|---|---|---|
Resource Group |
Not applicable |
No |
Yes |
No |
No |
Policy |
Not applicable |
No |
Yes |
No |
No |
Backup |
Not applicable |
No |
Yes |
No |
No |
Host |
Not applicable |
No |
Yes |
No |
No |
Storage Connection |
Not applicable |
No |
Yes |
No |
No |
Clone |
Not applicable |
No |
Yes |
No |
No |
Provision |
Not applicable |
No |
Yes |
No |
No |
Dashboard |
Yes |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Reports |
Yes |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Restore |
No |
No |
Not applicable |
Not applicable |
Not applicable |
Resource |
No |
No |
Yes |
Yes |
No |
Plug-in Install/Uninstall |
No |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Migration |
No |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Mount |
Yes |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Unmount |
Yes |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Full Volume Restore |
No |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
SecondaryProtection |
No |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Job Monitor |
Yes |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Infrastructure Admin role
The Infrastructure Admin role has permissions enabled for host management, storage management, provisioning, resource groups, remote installation reports, and access to the Dashboard.
Permissions | Enabled | Create | Read | Update | Delete |
---|---|---|---|---|---|
Resource Group |
Not applicable |
Yes |
Yes |
Yes |
Yes |
Policy |
Not applicable |
No |
Yes |
Yes |
Yes |
Backup |
Not applicable |
Yes |
Yes |
Yes |
Yes |
Host |
Not applicable |
Yes |
Yes |
Yes |
Yes |
Storage Connection |
Not applicable |
Yes |
Yes |
Yes |
Yes |
Clone |
Not applicable |
No |
Yes |
No |
No |
Provision |
Not applicable |
Yes |
Yes |
Yes |
Yes |
Dashboard |
Yes |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Reports |
Yes |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Restore |
Yes |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Resource |
Yes |
Yes |
Yes |
Yes |
Yes |
Plug-in Install/Uninstall |
Yes |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Migration |
No |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Mount |
No |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Unmount |
No |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Full Volume Restore |
No |
No |
Not applicable |
Not applicable |
Not applicable |
SecondaryProtection |
No |
No |
Not applicable |
Not applicable |
Not applicable |
Job Monitor |
Yes |
Not applicable |
Not applicable |
Not applicable |
Not applicable |