Child pages
  • opFlowSP - Role Based Access Control (RBAC) Configuration
Skip to end of metadata
Go to start of metadata

Purpose

Demonstrate opFlowSP Role Based Access Control (RBAC) feature.

Feature Description

Service providers may want to allow customers to view flow statistics related to their interfaces, yet prevent them from viewing other customer interfaces.  This feature facilitates this functionality.

Order of Operation

  • Create a role (GUI)
  • Create a user and assign a role (GUI)
  • Create an object with a privilege tag (CLI)
  • Associate the privilege tag with a role (CLI)

Configuration

Create a Role

From the opFlowSP main page, top menu bar, select System -> Portal Roles.  This should render the following page.

Click the blue '+' button to add a role.  At a minimum enter a name and click 'Add'.

Create a User

From the opFlowSP top menu bar, select System -> Portal Users. This should render the following page.

Click the blue '+' button to an a user.

At a minimum do the following.

  • Add a username
  • From the Role drop down menu, choose a previously provisioned Role.
  • Enter a password

Create an Object with a Privilege Tag

This is accomplished via the CLI. Objects are assigned a 'Privilege Tag'.  These tags are latter associated with Roles; thus enabling users assigned to that Role to view them.  The 'Privilege Tag' provides a lot of granularity.

The object in this example is a specific interface on a network device. 

Syntax

/usr/local/omk/bin/oprbac_admin.exe act=create-object path=root,opflowsp,agent,<IP Address>,interface,<SNMP IF Number> read_privileges=<Privilege Tag>

  • IP Address:  The IP address that the network device uses to source flow data.
  • SNMP IF Number:  This is the SNMP index number of the interface in question.
  • Privilege Tag:  This tag is user defined and will be assigned to a role.

It's possible to set a privilege tag for an entire node by simply not adding the interface information.  This would allow all the interfaces for a particular node to be viewed; for example:

 

Associate a Privilege Tag with a Role

This step is also accomplished via the CLI.

Syntax

/usr/local/omk/bin/oprbac_admin.exe act=update-role name=<Role Name> privileges=<Privilege Tag>

  • Role Name:  The role that the user is assigned to.
  • Privilege Tag: The privilege tag that is associated with the previously defined interface object that the user is allowed to view.

Verification

Log in as the newly configured user and verify only the allowed interfaces are available.

The CLI can also be used to verify access as seen below. 

 

 

  • No labels