Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

You can grant roles and admin groups read-only or read/write permission, or deny access to the following DNS resources:

    • DNS Views
    • DNS Zones
    • Response Policy Zones
    • All RPZ Rules
    • Hosts
    • Bulk Hosts
    • A records
    • AAAA records
    • CNAME records
    • DNAME records
    • MX records
    • PTR records
    • SRV records
    • TXT records
    • Hosts
    • Bulk Hosts
    • Shared Record Groups
    • Shared A records
    • Shared AAAA records
    • Shared CNAME records
    • Shared MX records
    • Shared SRV records
    • Shared TXT records
    • DNS64 synthesis groups
    • Adding a blank A/AAAA record

The appliance applies permissions for DNS resources hierarchically. Permissions to a DNS view apply to all zones and resource records in that view. Permissions for a zone apply to all its subzones and resource records, and resource record permissions apply to those resource records only. To override permissions set at higher level, you must define permissions at a more specific level. To assign permissions, see Applying Permissions and Managing Overlaps on page 207.




246NIOS Administrator Guide (Rev. A)NIOS 8.1
Administrative Permissions for DNS Resources

You can also define permissions for specific DNS objects and Grid member to restrict admins to perform only the specified DNS tasks on the specified member. For more information, see Defining DNS and DHCP Permissions on Grid Members .
The following sections describe the different types of permissions that you can set for DNS resources:


Administrative Permissions for DNS View s
Limited-access admin groups can access DNS views, including the default view, only if their administrative permissions are defined. Permissions to a DNS view apply to all its zones and resource records. To override view-level permissions, you must define permissions for its zones and resource records. For example, you can grant an admin group read-only permission to a view and read/write permission to all its zones. This allows the admins to display the view properties, but not edit them, and to create, edit and delete zones in the view.
You can grant read-only or read/write permission, or deny access to DNS views, as follows:

    • All views—Global permission that applies to all DNS views in the database.
    • A specific view—Applies to its properties and its zones, if you do not define zone-level permissions. This overrides the global view permissions.
    • All zones in a view—If you do not define permissions for zones, they inherit the permissions of the view they are in.

For information on setting permissions for a view and its zones, see Applying Permissions and Managing Overlaps
About Administrative Permissions#bookmark423.
The following table lists the tasks admins can perform and the required permissions for DNS views.
Table 4.13 Permissions for DNS Views






Tasks

Grid Member(s)

All DNS Views

Specific DNS View

All DNS Zones

Create, modify, and delete DNS views

 

RW

 

 

Create, modify, and delete DNS zones with assigned members

RW

 

 

RW

Create, modify, and delete DNS zones without assigned members

 

 

 

RW

Modify and delete a specific DNS view

 

 

RW

 

Create, modify, and delete DNS zones, subzones, and resource records in a specific DNS view

 

 

RW

RW

Add Grid members to a Match Members list of a DNS view

RW

 

RW

 

Delete a DNS view with Grid members in a Match Members list

RW

 

RW

 

View DNS view properties, DNS zones, and resource records

 

RO

 

 

View DNS zone properties, subzones, and resource records

 

 

 

RO

Restart services from the DNS tab

RO

 

RW

 









NIOS 8.1NIOS Administrator Guide (Rev. A)247
Managing Administrators
Administrative Permissions for Zone s
By default, zones inherit administrative permissions from the DNS view in which they reside. You can override view-level permissions by setting permissions for specific zones. Permissions set for a zone are inherited by its subzones and resource records. To override zone-level permissions, set permissions for specific subzones and resource records.
For example, you can grant an admin group the following permissions:

    • Read-only to a zone and to all its A, AAAA, and PTR records (in reverse and forward-mapping zones)
    • Read/Write permission to all MX and SRV records in the zone
    • Deny to all the other resource records—CNAME, DNAME, TXT, host, and bulk host You can grant read-only or read/write permission, or deny access to zones as follows:
    • All zones —Global permission that applies to all zones in all views.
    • All zones in a view—Permissions at this level override the global permissions.
    • A specific zone—Applies to the zone properties and resource records, if you do not define permissions for its resource records. This overrides global and view-level permissions. If you delete a zone and reparent its subzone, the subzone inherits the permissions of the new parent zone.
    • All Response Policy Zones—Global permission that applies to all the Response Policy Zones.
    • All Response Policy Rules—Global permission that applies to all the local Response Policy Zone rules.



Note: Object permissions are not applicable to Response Policy Zone rules.

    • Each resource record type in a zone—For example, you can define permissions for all A records and for all PTR records in a zone. if you do not define permissions for resource records, they inherit the permissions of the zone in which they reside.

For information on setting permissions for zones and resource records, see Applying Permissions and Managing Overlaps .
The following table lists the tasks admins can perform and the required permissions for zones.
Table 4.14 DNS Zone Permissions







Tasks

Grid Member(s)

Specific DNS View

All DNS Zones

Specific DNS Zone

Resource Records

Shared Record Group

Create, modify, and delete zones, subzones and resource records with assigned members

RW

 

RW

 

 

 

Create, modify, and delete zones, subzones and resource records without assigned members

 

 

RW

 

 

 

Lock and unlock a zone

 

 

 

RW

 

 

Delete a zone with assigned Grid members

RW

 

 

RW

 

 

Create, modify, and delete all zones, subzones, and resource records in a specific view

 

RW

RW

 

 

 

Assign a name server group (member) to a zone

RW

 

 

RW

 

 

Delete a zone with name server groups assigned

RW

 

 

RW

 

 

Assign a shared record group to a zone

 

 

 

RW

 

RW

View zone properties, subzones, and resource records of a specific zone

 

 

 

RO

 

 




248NIOS Administrator Guide (Rev. A)NIOS 8.1
Administrative Permissions for DNS Resources







Tasks

Grid Member(s)

Specific DNS View

All DNS Zones

Specific DNS Zone

Resource Records

Shared Record Group

Search for zones, subzones, and resource records in a specific DNS view

 

RO

RO

 

 

 

Copy resource records from one zone to another: Source zone

 

 

 

RO

RO

 

Copy resource records from one zone to another: Destination Zone

 

 

 

RW

RW

 


Administrative Permissions for Resource Records

Resource records inherit the permissions of the zone to which they belong. You can override zone-level permissions by setting permissions for specific resource records.
You can grant read-only or read/write permission, or deny access to resource records as follows:

    • Each resource record type in all zones and in all views—Global permission that applies to all resource records of the specified type; for example, all A records in the database.
    • Each resource record type in a zone— Permissions at this level override global permissions.
    • A specific resource record—Overrides zone-level permissions.

For information on setting permissions for resource records, see Applying Permissions and Managing Overlaps on page 207. The following table lists the tasks admins can perform and the required permissions for resource records.
Table 4.15 DNS Resources








Tasks

Resource Record Type

Specific Resource Record

Create, modify, and delete resource records for a specified type, such as all A records or all PTR records

RW

 

View resource records for a specified type only

RO

 

Search for records of a specified type

RO

 

View a specific resource record

 

RO

View, modify, and delete a specific resource record

 

RW


The following are additional guidelines:

    • Only admins with read/write permission to bulk host records and read/write permission to reverse zones can create bulk host records and automatically add reverse-mapping zones.
    • To create host records, admins must have read/write permission to the network and zone of the host.
    • Admins must have read-only permission to the host records in a zone to view the Host Name Compliance Report. Admins must have read/write permission to the resource records in a zone to modify host names that do not comply with the host policy.




NIOS 8.1NIOS Administrator Guide (Rev. A)249
Managing Administrators

Administrative Permissions for Adding Blank A or AAAA Records

By default, only superusers can add and edit A, AAAA, shared A, and shared AAAA records with a blank name. Limited-access admin groups can add and edit A, AAAA, shared A, and shared AAAA records with a blank name, only if their administrative permissions are defined. You can grant read/write or deny permission to Adding a blank A/AAAA record for specific admin groups, which applies to all admin roles in the group. You can define global permissions for specific admin groups and roles to allow limited-access users to add and edit blank A, AAAA, shared A, and shared AAAA records, as described in Defining Global Permissions .

Administrative Permissions for Shared Record Group s

By default, only superusers can add, edit, and delete shared record groups. Limited-access admin groups can access shared record groups, only if their administrative permissions are defined.
You can set different permissions for a shared record group and for each type of shared resource record in the group. For example, you can grant a role or an admin group the following permissions:

    • Read-only to a shared record group and to all its shared A, AAAA, and CNAME records
    • Read/Write permission to all the shared MX and SRV records in the shared record group
    • Deny to the TXT records

You can grant read-only or read/write permission, or deny access to shared record groups, as follows:

    • All shared record groups—Global permission that applies to all shared record groups in the database.
    • A specific shared record group—Overrides global permissions.
    • Each shared record type in all shared record groups — The shared resource record types include shared A records, shared AAAA records, shared CNAME records, shared MX records, shared SRV records, and shared TXT resource records.
    • Each shared record type in a shared record group— Permissions at this level override global permissions.
    • A specific shared record—Overrides zone-level permissions. Note the following guidelines:
    • Shared record group permissions override zone permissions.
    • Even if a zone is locked, superusers and limited-access users with read/write access can still edit or delete a shared record in the zone.

For information on setting permissions for shared record groups, see Applying Permissions and Managing Overlaps About Administrative Permissions#bookmark423. The following table lists the tasks admins can perform and the required permissions for shared record groups.
Table 4.16 Permissions for Shared Record Groups










Tasks

All Shared Record Groups

Specific Shared REcord Group

Shared Record Type

Specific DNS Zone

Specific Shared Record

Create, modify, and delete shared record groups

RW

 

 

 

 

Modify and delete a shared record group

 

RW

 

 

 

View a shared record group

 

RO

 

 

 

Create, modify, and delete shared records for a specific type

 

 

RW

 

 




250NIOS Administrator Guide (Rev. A)NIOS 8.1
Administrative Permissions for DNS Resources










Tasks

All Shared Record Groups

Specific Shared REcord Group

Shared Record Type

Specific DNS Zone

Specific Shared Record

View or search for shared records of a specific type

 

 

RO

 

 

Create, modify, and delete shared records for a specific type in a specified shared record group

 

RW

RW

 

 

View shared records for a specific type in a specified shared record group only

 

RO

RO

 

 

Create, modify, and delete a shared record

 

 

 

 

RW

View a specific shared record

 

 

 

 

RO

Assign a shared record group to DNS zones

 

RW

 

RW

 

Change the DNS zones associated with a shared record

 

RW

 

RW

 

Delete zones with a shared record group assigned. Before you delete a shared record group, you must remove all zones associated with it.

 

RW

 

RW

 


Administrative Permissions for DNS64 Synthesis Groups

By default, only superusers can add, edit, and delete DNS64 synthesis groups. Limited-access admin groups can access synthesis groups, only if their administrative permissions are defined.
You can grant read-only or read/write permission, or deny access to synthesis groups, as follows:

    • All synthesis groups—Global permission that applies to all shared record groups in the database.
    • A specific synthesis group—Overrides global permissions.

For information on setting permissions for synthesis groups, see Applying Permissions and Managing Overlaps on page 207. The following table lists the tasks admins can perform and the required permissions for synthesis groups.
Table 4.17 Permissions for DNS64 Synthesis Groups










Tasks

All Synthesis Groups

Specific Synthesis Group

Grid

Specific Member

Specific DNS View

Create, modify, and delete synthesis groups

RW

 

 

 

 

Modify and delete a specific synthesis group

 

RW

 

 

 

View a synthesis group

 

RO

 

 

 

Apply a synthesis group to the Grid

 

RO

RW

 

 

Apply a synthesis group to a member

 

RO

 

RW

 





NIOS 8.1NIOS Administrator Guide (Rev. A)251
Managing Administrators










Tasks

All Synthesis Groups

Specific Synthesis Group

Grid

Specific Member

Specific DNS View

Apply a synthesis group to a DNS view

 

RO

 

 

RW





  • No labels