Role-based access control in SnapCenter
SnapCenter role-based access control (RBAC) and ONTAP permissions allow SnapCenter administrators to assign resource access to users or groups. This centrally managed access empowers application administrators to work securely within designated environments.
You should create or modify roles and add resource access to users. When setting up SnapCenter for the first time, add Active Directory users or groups to roles and assign resources to those users or groups.
|
SnapCenter does not create user or group accounts. Create user or group accounts in the Active Directory of the operating system or the database. |
Types of RBAC in SnapCenter
SnapCenter supports the following types of role-based access control:
-
SnapCenter RBAC
-
Application-level RBAC
-
SnapCenter plug-in for VMware vSphere RBAC
-
ONTAP permissions
SnapCenter RBAC
SnapCenter has predefined roles and you can assign users or groups to these roles.
-
SnapCenter Admin role
-
App Backup and Clone Admin role
-
Backup and Clone Viewer role
-
Infrastructure Admin role
When you assign a role to a user, SnapCenter displays the jobs that are relevant to that user on the Jobs page, unless the user has the SnapCenterAdmin role.
You can also create new roles and manage permissions and users. You can assign permissions to users or groups to access SnapCenter objects such as hosts, storage connections, and resource groups.
You can assign RBAC permissions to users and groups within the same forest and to users belonging to different forests. You cannot assign RBAC permissions to users belonging to nested groups across forests.
|
When you create a custom role, make sure it includes all permissions of the SnapCenterAdmin role. If you copy only some permissions, SnapCenter prevents you from performing all operations. |
Users must authenticate when logging in through the user interface or PowerShell cmdlets. If users have multiple roles, they select a role after logging in. Authentication is also required to run APIs.
Application-level RBAC
SnapCenter uses credentials to verify that authorized SnapCenter users also have application-level permissions.
For example, to perform data protection operations in a SQL Server environment, set the right Windows or SQL credentials. If you want to perform data protection operations in a Windows file system environment on ONTAP storage, the SnapCenter admin role must have admin privileges on the Windows host.
Similarly, if you want to perform data protection operations on an Oracle database and if the operating system (OS) authentication is disabled on the database host, you must set credentials with the Oracle database or Oracle ASM credentials. The SnapCenter Server authenticates the credentials set using one of these methods depending on the operation.
SnapCenter Plug-in for VMware vSphere RBAC
If you are using the SnapCenter VMware plug-in for VM-consistent data protection, the vCenter Server provides an additional level of RBAC. The SnapCenter VMware plug-in supports both vCenter Server RBAC and ONTAP RBAC. Learn More
NOTE:NetApp recommends that you create one ONTAP role for SnapCenter Plug-in for VMware vSphere operations and assign it all the required privileges.
ONTAP permissions
You should create vsadmin account with the required permissions to access the storage system. Learn More
Permissions assigned to the pre-defined SnapCenter roles
When you add a user to a role, assign either the StorageConnection permission to enable storage virtual machine (SVM) communication, or assign an SVM to the user to grant permission to use the SVM. The Storage Connection permission allows users to create SVM connections.
For example, a SnapCenter Admin can create SVM connections and assign them to App Backup and Clone Admin users, who cannot create or edit SVM connections. Without an SVM connection, users cannot perform backup, clone, or restore operations.
SnapCenter Admin role
The SnapCenter Admin role has all permissions enabled. You cannot modify the permissions for this role. You can add users and groups to the role or remove them.
App Backup and Clone Admin role
The App Backup and Clone Admin role has the permissions required to perform administrative actions for application backups and clone-related tasks. This role does not have permissions for host management, provisioning, storage connection management, or remote installation.
Permissions | Enabled | Create | Read | Update | Delete |
---|---|---|---|---|---|
Resource Group |
Not applicable |
Yes |
Yes |
Yes |
Yes |
Policy |
Not applicable |
Yes |
Yes |
Yes |
Yes |
Backup |
Not applicable |
Yes |
Yes |
Yes |
Yes |
Host |
Not applicable |
Yes |
Yes |
Yes |
Yes |
Storage Connection |
Not applicable |
No |
Yes |
No |
No |
Clone |
Not applicable |
Yes |
Yes |
Yes |
Yes |
Provision |
Not applicable |
No |
Yes |
No |
No |
Dashboard |
Yes |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Reports |
Yes |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Restore |
Yes |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Resource |
Yes |
Yes |
Yes |
Yes |
Yes |
Plug-in Install/Uninstall |
No |
Not applicable |
Not applicable |
Not applicable |
|
Migration |
No |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Mount |
Yes |
Yes |
Not applicable |
Not applicable |
Not applicable |
Unmount |
Yes |
Yes |
Not applicable |
Not applicable |
Not applicable |
Full Volume Restore |
No |
No |
Not applicable |
Not applicable |
Not applicable |
SecondaryProtection |
No |
No |
Not applicable |
Not applicable |
Not applicable |
Job Monitor |
Yes |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Backup and Clone Viewer role
The Backup and Clone Viewer role has the read-only view of all permissions. This role also has permissions enabled for discovery, reporting, and access to the Dashboard.
Permissions | Enabled | Create | Read | Update | Delete |
---|---|---|---|---|---|
Resource Group |
Not applicable |
No |
Yes |
No |
No |
Policy |
Not applicable |
No |
Yes |
No |
No |
Backup |
Not applicable |
No |
Yes |
No |
No |
Host |
Not applicable |
No |
Yes |
No |
No |
Storage Connection |
Not applicable |
No |
Yes |
No |
No |
Clone |
Not applicable |
No |
Yes |
No |
No |
Provision |
Not applicable |
No |
Yes |
No |
No |
Dashboard |
Yes |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Reports |
Yes |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Restore |
No |
No |
Not applicable |
Not applicable |
Not applicable |
Resource |
No |
No |
Yes |
Yes |
No |
Plug-in Install/Uninstall |
No |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Migration |
No |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Mount |
Yes |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Unmount |
Yes |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Full Volume Restore |
No |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
SecondaryProtection |
No |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Job Monitor |
Yes |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Infrastructure Admin role
The Infrastructure Admin role has permissions enabled for host management, storage management, provisioning, resource groups, remote installation reports, and access to the Dashboard.
Permissions | Enabled | Create | Read | Update | Delete |
---|---|---|---|---|---|
Resource Group |
Not applicable |
Yes |
Yes |
Yes |
Yes |
Policy |
Not applicable |
No |
Yes |
Yes |
Yes |
Backup |
Not applicable |
Yes |
Yes |
Yes |
Yes |
Host |
Not applicable |
Yes |
Yes |
Yes |
Yes |
Storage Connection |
Not applicable |
Yes |
Yes |
Yes |
Yes |
Clone |
Not applicable |
No |
Yes |
No |
No |
Provision |
Not applicable |
Yes |
Yes |
Yes |
Yes |
Dashboard |
Yes |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Reports |
Yes |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Restore |
Yes |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Resource |
Yes |
Yes |
Yes |
Yes |
Yes |
Plug-in Install/Uninstall |
Yes |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Migration |
No |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Mount |
No |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Unmount |
No |
Not applicable |
Not applicable |
Not applicable |
Not applicable |
Full Volume Restore |
No |
No |
Not applicable |
Not applicable |
Not applicable |
SecondaryProtection |
No |
No |
Not applicable |
Not applicable |
Not applicable |
Job Monitor |
Yes |
Not applicable |
Not applicable |
Not applicable |
Not applicable |