11-15-2023 12:19 AM
I'd like to expose a subset of access policies such as VLAN pools, physical domains, AAEPs, leaf interface policy groups etc... to users linked to a security domain.
Therefore, a security domain has been created linked to a tenant and to a physical domain.
Next to this, I created explicit RBAC rules allowing access to certain access policies configuration. See picture below:
However, when logging in with that user coupled with this particular domain, the "fabric" tab in the GUI is not accessible. Hence, I can't navigate to the access policies:
Any ideas on how to overcome this?
ACI 5.2.7f is used.
Thanks a lot!
Laurent
11-19-2023 01:24 AM
Hi @laurent.dewilde ,
I've been pretty busy this past week and had hoped that someone would have replied by now.
Unfortunately, what you want is not possible in ACI. In my humble opinion, the scenario you describe is a bug. The only way I've found to get around the problem is to:
With that done, you should be able to log in using that user account and creat/assign policies and profiles WITH A COUPLE OF EXCEPTIONS
The exceptions are that the user will not be able to create Domains (or Tenants - but I imagine that is not a problem). The reason for that is because Phys and L3 Domains are child objects of uni in the MIT. If you changed step 1 above to a RBAC rule giving write access to uni, then the user WOULD BE ABLE TO create phy and L3 domains. AND EDIT EVERY OBJECT FOR EVERY TENANT and I suspect that is exactly what you are trying to avoid!!!!
Since you have given read access to a privilege in the all security domain, the user will be able to SEE everything - including all the other tenant and their configurations. What a bummer!
In short - Cisco really screwed up up the whole RBAC for ACI.
BTW - there is another option you can play with. You can make a Security Domain a Restricted Domain - but in my opinion it is too restrictive, and you still have to jump through the hoops I mentioned above to make it work.
11-21-2023 03:03 AM
Thanks RedNectar,
I tested the recommendations you've made and by allowing the domain "all" with the "access-admin" role, the user has read-only access over the entire ACI fabric, which is not the intention.
Then, I created a custom role with only the "access-equipment" privilege and assigned this to the "all" domain.
This limits view access to the fabric somewhat. However, now for example the VLAN pools are not accessible anymore
I tested both with the "uni/infra" MO as well as with more specific MOs.
Then, I added the "access-connectivity" privilege to the role, and then the VLAN pools are visible, along with nearly the entire ACI fabric config. => also not optimal.
In the end, we can conclude that making available selective items of the ACI fabric to certain users who are member of a domain using explicit RBAC rules is not possible in ACI, although it is mentioned in the ACI security configuration guide.
Must indeed be a bug.
Regards,
Laurent.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide