Managing roles of users and groups
Assign certain roles to users and groups to control which sections of the local management interface and web services they can access.
About this task
With Management Authorization, you can perform the following tasks:
- Add or remove a role.
- Assign a role to groups or users in local or remote LDAP user registry.Note: You can search for remote LDAP users or groups by entering a search pattern and clicking Search. Then, select the user or group from the search results and click Add.
- Edit permissions for a role.
The roles for a user session are determined when a user first logs in. If the authorization configuration is modified and deployed when a user is logged in, the changes take effect immediately.
The default roles are not updated after an appliance firmware upgrade. If the appliance firmware upgrade introduces new features, existing roles are not updated to include permission for any new features. The default roles can be manually updated in the Management Authorization page. See Step 3 "Editing permissions for a role.
The authorization settings do not affect the main system account admin, which always has read and write permission to all features. The admin account can be used for recovery.
Permissions can be set for all features in the appliance except for the Home: Appliance Dashboard. Any user who can authenticate can view Home: Appliance Dashboard, even if they are not assigned to any roles.
- Account Management
- Management Authorization
When you search for remote LDAP users or groups, consider the following points:
- Users are assumed to be contained in the Base DN and are identified based on the User Attribute that is set on the Management Authentication page.
- Groups are also assumed to be contained in the Base DN that is defined on the Management Authentication page.
- Groups are identified based on cn.
- Groups must be among the following types: group, groupofUniqueName, or groupOfNames.
Authorization enforcement applies to the local management interface, web services, and client certificate authentication.
- Authorization enforcement in the local management interface
- When a user logs in the local management interface, the menu displays only the pages that the user has access to. When users attempt to go to a page to which they do not have access, a page is displayed that explains that the user does not have authorization to view the page. When a user views a page with read-only permission, users cannot modify the configuration or change the state of any services on the page. If a user attempts to do so, a message is displayed stating that the user does not have permission to perform the requested action.
- Authorization enforcement in web services
- If a user has read-permission for a feature, they can perform
GETrequests against the associated Web services. If a user has write-permissions on a feature, they can issue any of the associatedGET,POST,PUT, andDELETEweb services. When a user attempts to issue a web service request that they are not authorized to perform, they receive a response with the HTTP status code 403 Forbidden and a message that states that they are not authorized to complete the transaction. - Authorization enforcement in client certificate authentication
- If you want to use client certificates to authenticate to the local management interface, ensure
that the authorization framework can map the
DNof the presented client certificate to a user that exists in the registry that is used for authentication.For example, a certificate is presented with
DN: cn=testUser,ou=qa,o=ibm,c=au.When you use a remote LDAP user registry for authentication, the authorization decision is made for a user that matches the entire DN in the user registry.
For example, a user that matches
cn=testUser,ou=qa,o=ibm,c=auis searched for in the remote LDAP user registry, and the policy that is associated with that user is enforced.When you use the local user database, the authorization decision is made for a user that matches the
CNof the presentedDN. For example, the user that is calledtestUseris searched for in the local user database, and the policy that is associated with that user is enforced. - Authorization enforcement in the Command Line Interface
- Access to the command line interface from the console or SSH can be restricted by using the ‘CLI and CLI Web Service’ feature. Only those users who have 'write’ access to this feature will be permitted to access the command line interface.
A user can be assigned multiple roles. In this case, the user receives the highest cumulative permission from these roles for each feature. For example, if they are assigned two roles and one role has read-permission for a feature but the second role has write-permission for the feature, the user is granted write-permission.
lmi.authCache.baenabled with a
value of false to disable this caching. See Managing advanced tuning parameters.- A user logs in the local management interface through the browser.
- A request to the web services API by using Basic Authentication is received.
There is some degradation of performance in environments that make heavy use of the web services API by using Basic Authentication.