Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

You can assign permissions to admin roles which you then assign to admin groups, or you can assign permissions directly to an admin group. The following are permissions you can grant admin groups and roles:

...

When you set permissions that overlap with existing permissions, Grid Manager displays a warning about the overlaps. You can view detailed information and find out which permissions the appliance uses and which ones it ignores. For information, see Applying Permissions and Managing Overlaps below.

...

Permissions (Read/Write, Read-Only, or Deny)

Administration Permissions

All Certificate Authentication Services

For more information, see Administrative Permissions for Certificate Authentication Services and CA Certificates.

All CA Certificates

Object Change Tracking

For more information, see Administrative Permissions for Object Change Tracking.

Cloud Permissions

All Tenants

For more information, see Administrative Permissions for Cloud Objects.

Named ACL Permissions

Named ACL

For more information, see Administrative Permissions for Named ACLs.

DHCP Permissions

Grid DHCP Properties

For more information, see Administrative Permissions for Common Tasks.

All Network Views

For more information, see Administrative Permissions for DHCP Resources.

All IPV4/IPv6 Networks

For more information, see Administrative Permissions for IPv4 and IPv6 Networks and Shared Networks.

All Hosts

For more information, see Administrative Permissions for IPAM Resources.

All DHCP Fingerprints

For more information, see Administrative Permissions.

All DHCP MAC Filters

For more information , see Administrative Permissions for DHCP Resources.

All IPv4/IPv6 DHCP Fixed Addresses/Reservations

For more information, see Administrative Permissions for IPv4 or IPv6 Fixed Addresses and IPv4 Reservations.

All IPv4/IPv6 Host Addresses

For more information, see Administrative Permissions for DHCP Resources.

All IPv4/IPv6 Ranges

For more information, see Administrative Permissions for IPv4 and IPv6 DHCP Ranges.

All IPv4/IPv6 Shared Networks

For more information, see Administrative Permissions for IPv4 and IPv6 Networks and Shared Networks.

All IPv4/IPv6 DHCP Templates

For more information, see Administrative Permissions for IPv4 or IPv6 DHCP Templates.

All Microsoft Superscopes

For more information, see Administrative Permissions for IPv4 or IPv6 DHCP Templates.

All Roaming Hosts

For more information, see Administrative Permissions for Roaming Hosts.

DHCP IPv4/IPv6 Lease History

For more information, see Administrative Permissions for the IPv4 and IPv6 DHCP Lease Histories.

DNS Permissions Grid

DNS Properties

For more information, see Administrative Permissions for Common Tasks.

All DNS Views

For more information, see Administrative Permissions for Common Tasks.

All DNS Zones

For more information, see Administrative Permissions for Common Tasks.

All Hosts

For more information, see Administrative Permissions for Hosts.

All IPV4/IPV6 Host Addresses

For more information, see Administrative Permissions for DNS Resources with Associated IP addresses in Networks and Ranges.

All Resource Records (A, AAAA, CAA, CNAME, DNAME, NAPTR, MX, PTR, SRV, TXT, TLSA and Bulkhost)

For more information, see Administrative Permissions for Common Tasks.

All Shared Record Groups

For more information, see Administrative Permissions for Common Tasks.

All Shared Records (A, AAAA, MX, SRV and TXT)

For more information, see Administrative Permissions for Common Tasks.

All Rulesets (BLACK List Rulesets and NXDOMAIN Rulesets)

For more information, see Administrative Permissions for DHCP Resources.

All DNS64 Synthesis Groups

For more information, see Administrative Permissions for DNS64 Synthesis Groups.

All Response Policy Zones

For more information, seeAdministrative Permissions for Zonesand License Requirements and Admin Permissions.

All Response Policy Rules

For more information, seeAdministrative Permissions for Zonesand License Requirements and Admin Permissions.

All DTC Objects (LBDN Records, LBDNs, Pools, Servers, Monitors, Certificates, GeoIP and Topologies)

For more information, seeAdministrative Permissions for Zonesand License Requirements and Admin Permissions.

Adding a blank A/AAAA record

For more information, see Administrative Permissions for Common Tasks.

File Distribution Permissions

Grid File Distribution Permissions

For more information, see Administrative Permissions for File Distribution Services.

Grid Permissions

All Members

For more information, see Administrative Permissions for Common Tasks.

Network Discovery

For more information, see Administrative Permissions for Discovery.

Schedule Tasks

For more information, see Administrative Permissions for Scheduling Tasks.

CSV Import

For more information, see Administrative Permissions for Named ACLs.

All Microsoft Servers

For more information, see Administrative Permissions for Microsoft Servers.

All Dashboard Tasks

For more information, see Administrative Permissions for Dashboard Tasks.

All Kerberos keys

For more information, see Configuring GSS-TSIG keys.

All Active Directory Domains

For more information, see Managing Active Directory Sites.

IPAM Permissions

All Network Views

For more information, see Administrative Permissions for Common Tasks.

All IPv4 Networks

For more information, see Administrative Permissions for IPv4 and IPv6 Networks and Shared Networks.

All IPv6 Networks

For more information, see Administrative Permissions for IPv4 and IPv6 Networks and Shared Networks.

All Hosts

For more information, see Administrative Permissionsfor Hosts.

All IPv4 Host Addresses

For more information, see Administrative Permissions for DNS Resources with Associated IP addresses in Networks and Ranges.

All IPv6 Host Addresses

For more information, see Administrative Permissions for DNS Resources with Associated IP addresses in Networks and Ranges.

Port Control

For more information, see Administrative Permissions for Discovery.

SAML Permissions

SAML Authentication Services

For more information, see Administrative Permissions for SAML.

Super Host Permissions

Super Host Permissions

For more information, see About Administrative Permissions for Super Hosts.

Security Permissions

Grid Security Permissions

For more information, see Administrative Permissions.

Reporting Permissions

Grid Reporting Permissions

For more information, see Administrative Permissions for Common Tasks.

Reporting Dashboard

For more information, see Administrative Permissions for Reporting.

Reporting Search

For more information, see Administrative Permissions for Reporting.

VLAN Permissions

VLAN views, VLAN ranges, and VLAN objects

For more information, see Administrative Permissions for VLAN Management.


Defining Object Permissions

You can add permissions to specific objects for selected admin groups or roles. When you add permissions to objects, you can select multiple objects with the same or different object types. When you select multiple objects with the same object type, you can apply permissions to the selected objects as well as the sub object types that are contained in the selected objects. As described in the below figure Selecting Multiple Objects with the Same Object Type, when you select five DNS forward-mapping authoritative zones, the appliance displays the object type "AuthZone" for all the zones. Since all five DNS zones are of the same object type, you can also apply permissions to all the resource records in these zones. The appliance displays the resources in the resource section of the Create Object Permissions editor. You can choose one or more of the resources to which you want to apply permissions.
In Cloud Network Automation, admin groups and admin users who have cloud API access have full permissions to delegated. However, you must specifically assign permissions for objects that have not been delegated in order for any admin groups or admin users to gain permission to these objects. Therefore, an admin group that has access to the cloud API would have full permissions to all delegated objects but limited permissions to non-delegated objects.
For information about how to allow cloud API access to an admin group, see Creating Limited-Access Admin Groups. For information about guidelines for authority delegation, see About Authority Delegation.
Selecting Multiple Objects with the Same Object Type

...

When you select multiple objects with more than one object type, you can add permissions to the selected objects as well as to the sub object types that are common among the selected objects. For example, when you select three DNS forward-mapping authoritative zones and two DNS IPv4 reverse-mapping authoritative zones as illustrated in the below figure Multiple Objects with Common Sub Object Types, you can apply permissions to all the five DNS zones as well as to the CNAME, DNAME, and host records in these zones because CNAME, DNAME, and host records are the common sub object types in these zones.

Multiple Objects with Common Sub Object Types
When you select three DNS forward-mapping authoritative zones and two IPv4 reverse-mapping authoritative zones, you can apply object permissions to all the DNS zones as well as the CNAME, DNAME and Host records in these DNS zones.

...

You can restrict certain admin groups or roles to perform specific DNS and DHCP tasks on specific Grid members by assigning the correct global and object permissions. You can use this feature to separate the DNS and DHCP administration on different Grid members. For example, you can create an admin group or role that can only create, modify, and delete DHCP ranges in a specific network on a specific member in the Grid. This admin group or role is restricted to the specified tasks on the selected Grid member. It cannot perform other DNS or DHCP tasks on this member, and it cannot perform the specified tasks on other Grid members.
For example, you can define permissions that allow admins to create, modify, and delete DHCP ranges in network 10.0.0.0/8 on Grid member "sales.infoblox.com" by granting read/write object permissions to all DHCP ranges, network 10.0.0./8, and member DHCP on sales.infoblox.com. Admins with these permissions can only add, modify, and delete DHCP ranges in network 10.0.0.0/8 on Grid member sales.infoblox.com. They cannot perform other DHCP or DNS tasks on the member, and they cannot perform these tasks on other Grid members.
For information about required permissions for specific DNS and DHCP tasks, see Administrative Permissions for Common Tasks.
You can define the following DNS and DHCP permissions for an admin group or role:

...

To specify member DNS and DHCP permissions, define DNS or DHCP permissions at the global or object level for an admin group or admin role, as described in Defining Global Permissions and Defining Object Permissions above. Ensure that you include the Grid member object to which you want to restrict DNS or DHCP administration. You can assign valid permissions to administrators to manage kerberos keys. For more information, see Configuring GSS-TSIG keys.
You can also control whether the admins can modify DNS or DHCP properties on a member, as described in Modifying Permissions on a Grid Member below. 

...

You can check for overlapped permissions when you add permissions to roles and to admin groups, and when you assign roles to an admin group. When you create a permission that overlaps with existing permissions, Grid Manager displays a warning message and the SeeConflicts link on which you click to view the overlapped permissions. For information, see Viewing Overlapping Permissions below. You can also use the quick filter Overlaps to filter overlapped permissions, the appliance lists permissions that overlap with other permissions. If you want to change the permission the appliance uses, you must change the order in which the roles are listed or change the permissions that are directly assigned to the admin group. For information about Creating Limited-Access Admin Groups, see About Admin Groups.

Viewing Overlapping Permissions

...

You can click the arrow key next to the resource to view the permission that is being ignored in the overlap.

Anchor
ManPerm
ManPerm
Managing Permissions

After you define permissions for an admin group and role, you can do the following:

...

  • Group/Role: The name of the admin group or role.

  • Permission Type: The type of permissions. This can be Administration Permissions, Analytics Threat Insight Permissions, Cloud Permissions, Named ACL Permissions, DHCP Permissions, DNS Permissions, File Distribution Permissions, Grid Permissions, IPAM Permissions, Reporting Permissions, or Security Permissions.

  • Resource: The name of the object. For example, this field displays All Hosts if you have defined permissions for all the hosts in the Grid.

  • Resource Type: The object type. For example, this can be Host, PTR record, or Shared Network.

  • Permission: The defined permission for the resource.

...