Skip to main content
SnapCenter software

Role-based access control in SnapCenter

Contributors netapp-soumikd

SnapCenter role-based access control (RBAC) and ONTAP permissions allow SnapCenter administrators to assign resource access to users or groups. This centrally managed access empowers application administrators to work securely within designated environments.

You should create or modify roles and add resource access to users. When setting up SnapCenter for the first time, add Active Directory users or groups to roles and assign resources to those users or groups.

Note SnapCenter does not create user or group accounts. Create user or group accounts in the Active Directory of the operating system or the database.

Types of RBAC in SnapCenter

SnapCenter supports the following types of role-based access control:

  • SnapCenter RBAC

  • Application-level RBAC

  • SnapCenter plug-in for VMware vSphere RBAC

  • ONTAP permissions

SnapCenter RBAC

SnapCenter has predefined roles and you can assign users or groups to these roles.

  • SnapCenter Admin role

  • App Backup and Clone Admin role

  • Backup and Clone Viewer role

  • Infrastructure Admin role

When you assign a role to a user, SnapCenter displays the jobs that are relevant to that user on the Jobs page, unless the user has the SnapCenterAdmin role.

You can also create new roles and manage permissions and users. You can assign permissions to users or groups to access SnapCenter objects such as hosts, storage connections, and resource groups.

You can assign RBAC permissions to users and groups within the same forest and to users belonging to different forests. You cannot assign RBAC permissions to users belonging to nested groups across forests.

Note When you create a custom role, make sure it includes all permissions of the SnapCenterAdmin role. If you copy only some permissions, SnapCenter prevents you from performing all operations.

Users must authenticate when logging in through the user interface or PowerShell cmdlets. If users have multiple roles, they select a role after logging in. Authentication is also required to run APIs.

Application-level RBAC

SnapCenter uses credentials to verify that authorized SnapCenter users also have application-level permissions.

For example, to perform data protection operations in a SQL Server environment, set the right Windows or SQL credentials. If you want to perform data protection operations in a Windows file system environment on ONTAP storage, the SnapCenter admin role must have admin privileges on the Windows host.

Similarly, if you want to perform data protection operations on an Oracle database and if the operating system (OS) authentication is disabled on the database host, you must set credentials with the Oracle database or Oracle ASM credentials. The SnapCenter Server authenticates the credentials set using one of these methods depending on the operation.

SnapCenter Plug-in for VMware vSphere RBAC

If you are using the SnapCenter VMware plug-in for VM-consistent data protection, the vCenter Server provides an additional level of RBAC. The SnapCenter VMware plug-in supports both vCenter Server RBAC and ONTAP RBAC. Learn More

NOTE:NetApp recommends that you create one ONTAP role for SnapCenter Plug-in for VMware vSphere operations and assign it all the required privileges.

ONTAP permissions

You should create vsadmin account with the required permissions to access the storage system. Learn More

Permissions assigned to the pre-defined SnapCenter roles

When you add a user to a role, assign either the StorageConnection permission to enable storage virtual machine (SVM) communication, or assign an SVM to the user to grant permission to use the SVM. The Storage Connection permission allows users to create SVM connections.

For example, a SnapCenter Admin can create SVM connections and assign them to App Backup and Clone Admin users, who cannot create or edit SVM connections. Without an SVM connection, users cannot perform backup, clone, or restore operations.

SnapCenter Admin role

The SnapCenter Admin role has all permissions enabled. You cannot modify the permissions for this role. You can add users and groups to the role or remove them.

App Backup and Clone Admin role

The App Backup and Clone Admin role has the permissions required to perform administrative actions for application backups and clone-related tasks. This role does not have permissions for host management, provisioning, storage connection management, or remote installation.

Permissions Enabled Create Read Update Delete

Resource Group

Not applicable

Yes

Yes

Yes

Yes

Policy

Not applicable

Yes

Yes

Yes

Yes

Backup

Not applicable

Yes

Yes

Yes

Yes

Host

Not applicable

Yes

Yes

Yes

Yes

Storage Connection

Not applicable

No

Yes

No

No

Clone

Not applicable

Yes

Yes

Yes

Yes

Provision

Not applicable

No

Yes

No

No

Dashboard

Yes

Not applicable

Not applicable

Not applicable

Not applicable

Reports

Yes

Not applicable

Not applicable

Not applicable

Not applicable

Restore

Yes

Not applicable

Not applicable

Not applicable

Not applicable

Resource

Yes

Yes

Yes

Yes

Yes

Plug-in Install/Uninstall

No

Not applicable

Not applicable

Not applicable

Migration

No

Not applicable

Not applicable

Not applicable

Not applicable

Mount

Yes

Yes

Not applicable

Not applicable

Not applicable

Unmount

Yes

Yes

Not applicable

Not applicable

Not applicable

Full Volume Restore

No

No

Not applicable

Not applicable

Not applicable

SecondaryProtection

No

No

Not applicable

Not applicable

Not applicable

Job Monitor

Yes

Not applicable

Not applicable

Not applicable

Not applicable

Backup and Clone Viewer role

The Backup and Clone Viewer role has the read-only view of all permissions. This role also has permissions enabled for discovery, reporting, and access to the Dashboard.

Permissions Enabled Create Read Update Delete

Resource Group

Not applicable

No

Yes

No

No

Policy

Not applicable

No

Yes

No

No

Backup

Not applicable

No

Yes

No

No

Host

Not applicable

No

Yes

No

No

Storage Connection

Not applicable

No

Yes

No

No

Clone

Not applicable

No

Yes

No

No

Provision

Not applicable

No

Yes

No

No

Dashboard

Yes

Not applicable

Not applicable

Not applicable

Not applicable

Reports

Yes

Not applicable

Not applicable

Not applicable

Not applicable

Restore

No

No

Not applicable

Not applicable

Not applicable

Resource

No

No

Yes

Yes

No

Plug-in Install/Uninstall

No

Not applicable

Not applicable

Not applicable

Not applicable

Migration

No

Not applicable

Not applicable

Not applicable

Not applicable

Mount

Yes

Not applicable

Not applicable

Not applicable

Not applicable

Unmount

Yes

Not applicable

Not applicable

Not applicable

Not applicable

Full Volume Restore

No

Not applicable

Not applicable

Not applicable

Not applicable

SecondaryProtection

No

Not applicable

Not applicable

Not applicable

Not applicable

Job Monitor

Yes

Not applicable

Not applicable

Not applicable

Not applicable

Infrastructure Admin role

The Infrastructure Admin role has permissions enabled for host management, storage management, provisioning, resource groups, remote installation reports, and access to the Dashboard.

Permissions Enabled Create Read Update Delete

Resource Group

Not applicable

Yes

Yes

Yes

Yes

Policy

Not applicable

No

Yes

Yes

Yes

Backup

Not applicable

Yes

Yes

Yes

Yes

Host

Not applicable

Yes

Yes

Yes

Yes

Storage Connection

Not applicable

Yes

Yes

Yes

Yes

Clone

Not applicable

No

Yes

No

No

Provision

Not applicable

Yes

Yes

Yes

Yes

Dashboard

Yes

Not applicable

Not applicable

Not applicable

Not applicable

Reports

Yes

Not applicable

Not applicable

Not applicable

Not applicable

Restore

Yes

Not applicable

Not applicable

Not applicable

Not applicable

Resource

Yes

Yes

Yes

Yes

Yes

Plug-in Install/Uninstall

Yes

Not applicable

Not applicable

Not applicable

Not applicable

Migration

No

Not applicable

Not applicable

Not applicable

Not applicable

Mount

No

Not applicable

Not applicable

Not applicable

Not applicable

Unmount

No

Not applicable

Not applicable

Not applicable

Not applicable

Full Volume Restore

No

No

Not applicable

Not applicable

Not applicable

SecondaryProtection

No

No

Not applicable

Not applicable

Not applicable

Job Monitor

Yes

Not applicable

Not applicable

Not applicable

Not applicable