Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

You can grant roles and admin groups read-only or read/write permission, or deny access to the following DNS resources:

  • DNS Views
  • DNS Zones
  • Response Policy Zones
  • All RPZ Rules
  • Hosts
  • Bulk Hosts
  • A records
  • AAAA records
  • CNAME records
  • DNAME records
  • MX records
  • PTR records
  • SRV records
  • TXT records
  • Hosts
  • Bulk Hosts
  • Shared Record Groups
  • Shared A records
  • Shared AAAA records
  • Shared CNAME records
  • Shared MX records
  • Shared SRV records
  • Shared TXT records
  • DNS64 synthesis groups
  • Adding a blank A/AAAA record

The appliance applies permissions for DNS resources hierarchically. Permissions to a DNS view apply to all zones and resource records in that view. Permissions for a zone apply to all its subzones and resource records, and resource record permissions apply to those resource records only. To override permissions set at higher level, you must define permissions at a more specific level. To assign permissions, see Applying Permissions and Managing Overlaps on page 207.
Image Removed
246NIOS Administrator Guide (Rev. A)NIOS 8. 1
Administrative Permissions for DNS Resources
You can also define permissions for specific DNS objects and Grid member to restrict admins to perform only the specified DNS tasks on the specified member. For more information, see Defining DNS and DHCP Permissions on Grid Members.
The following sections describe the different types of permissions that you can set for DNS resources:


Anchor
Administrative Permissions for DNS Views
Administrative Permissions for DNS Views
Anchor
bookmark517
bookmark517
Administrative Permissions for DNS View
Anchor
bookmark518
bookmark518
s

Limited-access admin groups can access DNS views, including the default view, only if their administrative permissions are defined. Permissions to a DNS view apply to all its zones and resource records. To override view-level permissions, you must define permissions for its zones and resource records. For example, you can grant an admin group read-only permission to a view and read/write permission to all its zones. This allows the admins to display the view properties, but not edit them, and to create, edit and delete zones in the view.
You can grant read-only or read/write permission, or deny access to DNS views, as follows:

  • All views—Global permission that applies to all DNS views in the database.
  • A specific view—Applies to its properties and its zones, if you do not define zone-level permissions. This overrides the global view permissions.
  • All zones in a view—If you do not define permissions for zones, they inherit the permissions of the view they are in.

For information on setting permissions for a view and its zones, see Applying Permissions and Managing Overlaps
About Administrative Permissions#bookmark423.
The following table lists the tasks admins can perform and the required permissions for DNS views.

Table 4.13 Permissions for DNS Views

Tasks

Grid Member(s)

All DNS Views

Specific DNS View

All DNS Zones

Create, modify, and delete DNS views

 


RW

 

 



Create, modify, and delete DNS zones with assigned members

RW

 

 



RW

Create, modify, and delete DNS zones without assigned members

 

 

 




RW

Modify and delete a specific DNS view

 

 



RW

 


Create, modify, and delete DNS zones, subzones, and resource records in a specific DNS view

 

 



RW

RW

Add Grid members to a Match Members list of a DNS view

RW

 


RW

 


Delete a DNS view with Grid members in a Match Members list

RW

 


RW

 


View DNS view properties, DNS zones, and resource records

 


RO

 

 



View DNS zone properties, subzones, and resource records

 

 

 




RO

Restart services from the DNS tab

RO

 


RW

 

...


Anchor
Administrative Permissions for Zones
Administrative Permissions for Zones
Anchor
bookmark519
bookmark519
Anchor
bookmark520
bookmark520
Administrative Permissions for Zone
Anchor
bookmark521
bookmark521
s

By default, zones inherit administrative permissions from the DNS view in which they reside. You can override view-level permissions by setting permissions for specific zones. Permissions set for a zone are inherited by its subzones and resource records. To override zone-level permissions, set permissions for specific subzones and resource records.
For example, you can grant an admin group the following permissions:

  • Read-only to a zone and to all its A, AAAA, and PTR records (in reverse and forward-mapping zones)
  • Read/Write permission to all MX and SRV records in the zone
  • Deny to all the other resource records—CNAME, DNAME, TXT, host, and bulk host You can grant read-only or read/write permission, or deny access to zones as follows:
  • All zones —Global permission that applies to all zones in all views.
  • All zones in a view—Permissions at this level override the global permissions.
  • A specific zone—Applies to the zone properties and resource records, if you do not define permissions for its resource records. This overrides global and view-level permissions. If you delete a zone and reparent its subzone, the subzone inherits the permissions of the new parent zone.
  • All Response Policy Zones—Global permission that applies to all the Response Policy Zones.
  • All Response Policy Rules—Global permission that applies to all the local Response Policy Zone rules.

...

Note: Object permissions are not applicable to Response Policy Zone rules.

...

  • Each resource record type in a zone—For example, you can define permissions for all A records and for all PTR records in a zone. if you do not define permissions for resource records, they inherit the permissions of the zone in which they reside.

For information on setting permissions for zones and resource records, see Applying Permissions and Managing Overlaps.
The following table lists the tasks admins can perform and the required permissions for zones.

Table 4.14 DNS Zone Permissions

Tasks

Anchor
Administrative Permissions for Resource
Administrative Permissions for Resource
Anchor
bookmark522
bookmark522
Anchor
bookmark523
bookmark523
Grid Member(s)

Specific DNS View

All DNS Zones

Anchor
bookmark524
bookmark524
Specific DNS Zone

Resource Records

Shared Record Group

Create, modify, and delete zones, subzones and resource records with assigned members

RW

 


RW

 

 

 




Create, modify, and delete zones, subzones and resource records without assigned members

 

 



RW

 

 

 




Lock and unlock a zone

 

 

 




RW

 

 



Delete a zone with assigned Grid members

RW

 

 



RW

 

 



Create, modify, and delete all zones, subzones, and resource records in a specific view

 


RW

RW

 

 

 




Assign a name server group (member) to a zone

RW

 

 



RW

 

 



Delete a zone with name server groups assigned

RW

 

 



RW

 

 



Assign a shared record group to a zone

 

 

 




RW

 


RW

View zone properties, subzones, and resource records of a specific zone

 

 

 




RO

 

 

...

Tasks AnchorAdministrative Permissions for Resource Administrative Permissions for Resource Anchorbookmark522bookmark522 Anchorbookmark523bookmark523Grid Member(s)

Specific DNS View

All DNS Zones

Anchorbookmark524bookmark524

Resource Records

Shared Record Group

Specific DNS Zone



Search for zones, subzones, and resource records in a specific DNS view

 


RO

RO

 

 

 




Copy resource records from one zone to another: Source zone

 

 

 




RO

RO

 


Copy resource records from one zone to another: Destination Zone

 

 

 




RW

RW

 


Administrative Permissions for Resource Records

Resource records inherit the permissions of the zone to which they belong. You can override zone-level permissions by setting permissions for specific resource records.
You can grant read-only or read/write permission, or deny access to resource records as follows:

  • Each resource record type in all zones and in all views—Global permission that applies to all resource records of the specified type; for example, all A records in the database.
  • Each resource record type in a zone— Permissions at this level override global permissions.
  • A specific resource record—Overrides zone-level permissions.

For information on setting permissions for resource records, see Applying Permissions and Managing Overlaps on page 207. The following table lists the tasks admins can perform and the required permissions for resource records.

Table 4.15 DNS Resources

Tasks

Resource Record Type

Specific Resource Record

Create, modify, and delete resource records for a specified type, such as all A records or all PTR records

RW

 


View resource records for a specified type only

RO

 


Search for records of a specified type

RO

 


View a specific resource record

 


RO

View, modify, and delete a specific resource record

 


RW


The following are additional guidelines:

  • Only admins with read/write permission to bulk host records and read/write permission to reverse zones can create bulk host records and automatically add reverse-mapping zones.
  • To create host records, admins must have read/write permission to the network and zone of the host.
  • Admins must have read-only permission to the host records in a zone to view the Host Name Compliance Report. Admins must have read/write permission to the resource records in a zone to modify host names that do not comply with the host policy.

...

...

Anchor
Administrative Permissions for Adding Bl
Administrative Permissions for Adding Bl
Anchor
bookmark525
bookmark525
Anchor
bookmark526
bookmark526
Administrative Permissions for Adding Blank A or AAAA Records

By default, only superusers can add and edit A, AAAA, shared A, and shared AAAA records with a blank name. Limited-access admin groups can add and edit A, AAAA, shared A, and shared AAAA records with a blank name, only if their administrative permissions are defined. You can grant read/write or deny permission to Adding a blank A/AAAA record for specific admin groups, which applies to all admin roles in the group. You can define global permissions for specific admin groups and roles to allow limited-access users to add and edit blank A, AAAA, shared A, and shared AAAA records, as described in Defining Global Permissions.

Anchor
Administrative Permissions for Shared Re
Administrative Permissions for Shared Re
Anchor
bookmark527
bookmark527
Administrative Permissions for Shared Record Group
Anchor
bookmark528
bookmark528
s

By default, only superusers can add, edit, and delete shared record groups. Limited-access admin groups can access shared record groups, only if their administrative permissions are defined.
You can set different permissions for a shared record group and for each type of shared resource record in the group. For example, you can grant a role or an admin group the following permissions:

  • Read-only to a shared record group and to all its shared A, AAAA, and CNAME records
  • Read/Write permission to all the shared MX and SRV records in the shared record group
  • Deny to the TXT records

You can grant read-only or read/write permission, or deny access to shared record groups, as follows:

  • All shared record groups—Global permission that applies to all shared record groups in the database.
  • A specific shared record group—Overrides global permissions.
  • Each shared record type in all shared record groups — The shared resource record types include shared A records, shared AAAA records, shared CNAME records, shared MX records, shared SRV records, and shared TXT resource records.
  • Each shared record type in a shared record group— Permissions at this level override global permissions.
  • A specific shared record—Overrides zone-level permissions. Note the following guidelines:
  • Shared record group permissions override zone permissions.
  • Even if a zone is locked, superusers and limited-access users with read/write access can still edit or delete a shared record in the zone.

...

Tasks

Anchor
Administrative Permissions for DNS64 Syn
Administrative Permissions for DNS64 Syn
Anchor
bookmark529
bookmark529
All Shared Record Groups

Specific Shared

REcord

Record Group

Shared Record Type

Specific DNS Zone

Specific Shared Record

Create, modify, and delete shared record groups

RW

 

 

 

 





Modify and delete a shared record group

 


RW

 

 

 




View a shared record group

 


RO

 

 

 




Create, modify, and delete shared records for a specific type

 

 



RW

 

 

...

Tasks AnchorAdministrative Permissions for DNS64 SynAdministrative Permissions for DNS64 Syn Anchorbookmark529bookmark529All Shared Record Groups

Specific Shared REcord Group

Shared Record Type

Specific DNS Zone

Specific Shared Record



View or search for shared records of a specific type

 

 



RO

 

 



Create, modify, and delete shared records for a specific type in a specified shared record group

 


RW

RW

 

 



View shared records for a specific type in a specified shared record group only

 


RO

RO

 

 



Create, modify, and delete a shared record

 

 

 

 





RW

View a specific shared record

 

 

 

 





RO

Assign a shared record group to DNS zones

 


RW

 


RW

 


Change the DNS zones associated with a shared record

 


RW

 


RW

 


Delete zones with a shared record group assigned. Before you delete a shared record group, you must remove all zones associated with it.

 


RW

 


RW

 


Administrative Permissions for DNS64 Synthesis Groups

By default, only superusers can add, edit, and delete DNS64 synthesis groups. Limited-access admin groups can access synthesis groups, only if their administrative permissions are defined.
You can grant read-only or read/write permission, or deny access to synthesis groups, as follows:

  • All synthesis groups—Global permission that applies to all shared record groups in the database.
  • A specific synthesis group—Overrides global permissions.

...

Tasks

Anchor
Administrative Permissions for DNS Resou

All Synthesis Groups

Specific

Administrative Permissions for DNS Resou
Anchor
Best Practices for Configuring Permissio
Best Practices for Configuring Permissio
Anchor
bookmark530
bookmark530
Anchor
bookmark531
bookmark531
All Synthesis GroupsSpecific Synthesis Group


Grid

Specific Member

Specific DNS View

Create, modify, and delete synthesis groups

RW

 

 

 

 





Modify and delete a specific synthesis group

 


RW

 

 

 




View a synthesis group

 


RO

 

 

 




Apply a synthesis group to the Grid

 


RO

RW

 

 



Apply a synthesis group to a member

 


RO

 

Tasks AnchorAdministrative Permissions for DNS ResouAdministrative Permissions for DNS Resou AnchorBest Practices for Configuring PermissioBest Practices for Configuring Permissio Anchorbookmark530bookmark530 Anchorbookmark531bookmark531All Synthesis Groups

Specific Synthesis Group

Grid

Specific Member

Specific DNS View


RW

 

...


Apply a synthesis group to a DNS view

 


RO

 

 



RW