Controlling access to specific devices
When devices are initially managed by Lenovo XClarity Administrator, a predefined set of role groups have permission to access the devices by default. You change the role groups that can access specific managed devices. When permission is given to certain role groups, only users that are members of those role groups can see and act on those specific devices.
Before you begin
Only users with lxc-supervisor, lxc-security-admin, or lxc-recovery authority can perform this action.
About this task
Access control is set on individual devices. It is not set for containers, such as racks and resource groups.
For components in a chassis or enclosure, users must have at least read-only access to the chassis or enclosure to the view components in that chassis or enclosure. If users do not have at least read-only access to the chassis or enclosure, those users might see the components in some views but are not guaranteed to see them in all views.
Users with lxc-supervisor authority can view and take actions on all resources regardless of whether they are in a role group that has specifically been given access to that resource. You cannot remove access to any resources for the lxc-supervisor role group.
If a user is not a member of a role group that has access to a specific managed device, the user cannot see or act on that specific device. This includes launching the management controller web interface through Lenovo XClarity Administrator. For Flex and System x devices, users also cannot directly log in to a CMM or management controller for which they do not have access.
The default access-control settings are used to set access permissions on devices when they are initially managed by XClarity Administrator and when resetting access permissions for a specific device to the default settings. Changing the default access-control settings does not automatically change access permissions on devices that are already managed.
If a user is a member of more than one role group, and the role groups are assigned to different devices, then the actions that the user is allowed to perform on each device might be different. For example, if the user is a member of default role groups LXC-FW-ADMIN and LXC-OS-ADMIN, and if LXC-FW-ADMIN is granted access to Server A but LXC-OS-ADMIN has not been granted access to Server A, then that user would be able to update the firmware on Server A but would not be able to deploy an operating system to Server A. If LXC-OS-ADMIN had been granted access to Server B but LXC-FW-ADMIN had not been granted access to server B, then that same user would be able to deploy an operating system to Server B but would not be able to update the firmware on Server B.
When limiting access to a device that has a parent resource (such as a server or switch in a Flex chasis), a user must have at least read-only permissions to the parent resource to interact fully with the device. If a user has at least read-only access to the device but not the parent, the user will not able be see the device inventory views, but might be able to see about the device in some views, such as jobs and events.
For example, you can create a role group for the parent and assign that role group the lxc-operator role. Include all users who should be able to access any of the children (such as a server or switch in a Flex chasis), in that role group. Then, include that role group as one of the groups that has access to the parent.
Procedure
Complete the following procedures to control access to specific devices by associating role groups with those devices.
After you finish
You can also control access to devices by performing the following actions:
Change the permissions to the default role groups and public access setting by clicking the Edit icon () and then clicking Rest to Defaults.
Change the default role group and public access setting (see Changing the default permissions.).
Disable resource-access control by clicking the Enabled toggle to change Resource Access Control to disabled. This means that all role groups can access all managed devices.