Skip to content

Commit 4833884

Browse files
committed
refresh updates
1 parent 33fe3ed commit 4833884

1 file changed

Lines changed: 17 additions & 17 deletions

File tree

articles/azure-vmware/architecture-identity.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.custom: "references_regions, engagement-fy23"
1010

1111
# Azure VMware Solution identity concepts
1212

13-
Azure VMware Solution private clouds are provisioned with a vCenter Server and NSX Manager. You use vCenter Server to manage virtual machine (VM) workloads and NSX Manager to manage and extend the private cloud. The CloudAdmin role is used for vCenter Server, the CloudAdmin role (with restricted permissions) is used for NSX Manager.
13+
Azure VMware Solution private clouds are provisioned with a vCenter Server and NSX Manager. You use vCenter Server to manage virtual machine (VM) workloads and NSX Manager to manage and extend the private cloud. The Cloud admin role is used for vCenter Server. With restricted permissions, the Cloud admin role is used for NSX Manager.
1414

1515
## vCenter Server access and identity
1616

@@ -21,15 +21,15 @@ Azure VMware Solution private clouds are provisioned with a vCenter Server and N
2121
2222
### View the vCenter Server privileges
2323

24-
To view the privileges granted to the Azure VMware Solution CloudAdmin role on your Azure VMware Solution private cloud vCenter, use the following steps:
24+
To view the privileges granted to the Azure VMware Solution Cloud admin role on your Azure VMware Solution private cloud vCenter, use the following steps:
2525

2626
1. Sign in to the vSphere Client and go to **Menu** > **Administration**.
2727
1. Under **Access Control**, select **Roles**.
2828
1. From the list of roles, select **CloudAdmin** and then select **Privileges**.
2929

30-
:::image type="content" source="media/concepts/role-based-access-control-cloudadmin-privileges.png" alt-text="Screenshot shows the roles and privileges for CloudAdmin in the vSphere Client.":::
30+
:::image type="content" source="media/concepts/role-based-access-control-cloudadmin-privileges.png" alt-text="Screenshot shows the roles and privileges for Cloud admin in the vSphere Client.":::
3131

32-
The CloudAdmin role in Azure VMware Solution has the following privileges on vCenter Server. For more information, see the [VMware product documentation](https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/8-0/vsphere-security-8-0/defined-privileges.html).
32+
The Cloud admin role in Azure VMware Solution has the following privileges on vCenter Server. For more information, see the [VMware product documentation](https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/8-0/vsphere-security-8-0/defined-privileges.html).
3333

3434
| Privilege | Description |
3535
| --------- | ----------- |
@@ -54,15 +54,15 @@ The CloudAdmin role in Azure VMware Solution has the following privileges on vCe
5454

5555
### Create custom roles on vCenter Server
5656

57-
Azure VMware Solution supports the use of custom roles with equal or lesser privileges than the CloudAdmin role. Use the CloudAdmin role to create, modify, or delete custom roles with privileges less than or equal to their current role.
57+
Azure VMware Solution supports the use of custom roles with equal or lesser privileges than the Cloud admin role. Use the Cloud admin role to create, modify, or delete custom roles with privileges less than or equal to their current role.
5858

5959
>[!NOTE]
60-
>You can create roles with privileges greater than CloudAdmin. However, you can't assign the role to any users or groups or delete the role. Roles that have privileges greater than CloudAdmin is unsupported.
60+
>You can create roles with privileges greater than Cloud admin. However, you can't assign the role to any users or groups or delete the role. Roles that have privileges greater than Cloud admin aren't supported.
6161
62-
To prevent creating roles that can't be assigned or deleted, clone the CloudAdmin role as the basis for creating new custom roles.
62+
To prevent creating roles that can't be assigned or deleted, clone the Cloud admin role as the basis for creating new custom roles.
6363

6464
#### Create a custom role
65-
1. Sign in to vCenter Server with [email protected] or a user with the CloudAdmin role.
65+
1. Sign in to vCenter Server with [email protected] or a user with the Cloud admin role.
6666

6767
1. Navigate to the **Roles** configuration section and select **Menu** > **Administration** > **Access Control** > **Roles**.
6868

@@ -87,7 +87,7 @@ To prevent creating roles that can't be assigned or deleted, clone the CloudAdmi
8787

8888
1. Select the role you want to apply to the user or group.
8989
>[!NOTE]
90-
>If you attempt to apply a user or group to a role with privileges greater than CloudAdmin, you get the result of an error.
90+
>If you attempt to apply a user or group to a role with privileges greater than Cloud admin, you get the result of an error.
9191
9292
1. Check the **Propagate to children** if needed, and select **OK**. The added permission displays in the **Permissions** section.
9393

@@ -105,9 +105,9 @@ You're responsible for VMware NSX software-defined networking (SDN) configuratio
105105
- Stateful services like gateway firewall
106106
- Load balancer on Tier-1 gateways
107107

108-
You can access VMware NSX Manager using the built-in local user 'cloudadmin' assigned to a custom role that gives limited privileges to a user to manage VMware NSX. While Microsoft manages the lifecycle of VMware NSX, certain operations aren't allowed to a user. Operations not allowed include editing the configuration of host and edge transport nodes or starting an upgrade. For new users, Azure VMware Solution deploys them with a specific set of permissions needed by that user. The purpose is to provide a clear separation of control between the Azure VMware Solution control plane configuration and Azure VMware Solution private cloud user.
108+
You can access VMware NSX Manager using the built-in local user Cloud admin assigned to a custom role that gives limited privileges to a user to manage VMware NSX. While Microsoft manages the lifecycle of VMware NSX, certain operations aren't allowed to a user. Operations not allowed include editing the configuration of host and edge transport nodes or starting an upgrade. For new users, Azure VMware Solution deploys them with a specific set of permissions needed by that user. The purpose is to provide a clear separation of control between the Azure VMware Solution control plane configuration and Azure VMware Solution private cloud user.
109109

110-
For new private cloud deployments, VMware NSX access is provided with a built-in local user cloudadmin assigned to the **cloudadmin** role with a specific set of permissions to use VMware NSX functionality for workloads.
110+
For new private cloud deployments, VMware NSX access is provided with a built-in local user Cloud admin assigned to the **cloudadmin** role with a specific set of permissions to use VMware NSX functionality for workloads.
111111

112112
### VMware NSX cloudadmin user permissions
113113

@@ -135,7 +135,7 @@ The following permissions are assigned to the **cloudadmin** user in Azure VMwar
135135
| System | Configuration<br>Settings<br>Settings<br>Settings | Identity firewall<br>Users and Roles<br>Certificate Management (Service Certificate only)<br>User Interface Settings | Full Access<br>Full Access<br>Full Access<br>Full Access |
136136
| System | All other | | Read-only |
137137

138-
You can view the permissions granted to the Azure VMware Solution cloudadmin role on your Azure VMware Solution private cloud VMware NSX.
138+
You can view the permissions granted to the Azure VMware Solution Cloud admin role on your Azure VMware Solution private cloud VMware NSX.
139139

140140
1. Sign in to the NSX Manager.
141141
1. Navigate to **Systems** and locate **Users and Roles**.
@@ -152,14 +152,14 @@ In an Azure VMware Solution deployment, the VMware NSX can be integrated with ex
152152
Unlike on-premises deployment, not all predefined NSX RBAC roles are supported with Azure VMware solution to keep Azure VMware Solution IaaS control plane config management separate from tenant network and security configuration. For more information, see the next section, Supported NSX RBAC roles.
153153

154154
> [!NOTE]
155-
> VMware NSX LDAP Integration is supported only with SDDCs with VMware NSX 'cloudadmin' user.
155+
> VMware NSX LDAP Integration is supported only with SDDCs with VMware NSX Cloud admin user.
156156
157157
### Supported and unsupported NSX RBAC roles
158158

159159
In an Azure VMware Solution deployment, the following VMware NSX predefined RBAC roles are supported with LDAP integration:
160160

161161
- Auditor
162-
- Cloudadmin
162+
- Cloud admin
163163
- LB Admin
164164
- LB Operator
165165
- VPN Admin
@@ -173,10 +173,10 @@ Unlike on-premises deployment, not all predefined NSX RBAC roles are supported w
173173
- NetX Partner Admin
174174
- GI Partner Admin
175175

176-
You can create custom roles in NSX with permissions lesser than or equal to CloudAdmin role created by Microsoft. Following are examples on how to create a supported 'Network Admin' and 'Security Admin' role.
176+
You can create custom roles in NSX with permissions lesser than or equal to the Cloud admin role created by Microsoft. Following are examples on how to create a supported 'Network Admin' and 'Security Admin' role.
177177

178178
> [!NOTE]
179-
> Custom role creation fails if you assign a permission not allowed by CloudAdmin role.
179+
> Custom role creation fails if you assign a permission not allowed by the Cloud admin role.
180180
181181
#### Create 'AVS network admin' role
182182

@@ -218,7 +218,7 @@ You can create custom roles in NSX with permissions lesser than or equal to Clou
218218
> The VMware NSX custom role doesn't support the VMware NSX Traceflow feature. The recommendation is to assign the **Auditor** role to the user along with the custom role to enable Traceflow feature for that user.
219219
220220
> [!NOTE]
221-
> VMware Aria Operations Automation integration with the NSX component of the Azure VMware Solution requires the 'auditor' role to be added to the user with the NSX Manager cloudadmin role.
221+
> VMware Aria Operations Automation integration with the NSX component of the Azure VMware Solution requires the 'auditor' role to be added to the user with the NSX Manager Cloud admin role.
222222
223223
## Next steps
224224

0 commit comments

Comments
 (0)