📜 ⬆️ ⬇️

Some notes on VMware vSphere Security Permissions

To provide access to various categories of users to their virtual machines, as a rule, they use the VM and Templates view and a system of folders to which, in fact, rights are assigned. However, in some cases this is not enough, because for some actions the user must have rights to environment objects that are not in the VM and Templates display. For example, to add a virtual hard disk or to clone VMs, you need Datastore.Allocate Space permissions or the Datastore Consumer role on a Datastore or Datastore Cluster object. And for the ability to change the network interface - the right Network.Assign Network or the role of the Network Administrator on the relevant portgroups. Further details on this and other nuances of assigning access rights in the vSphere. Information relevant to versions vSphere 5.1 and 5.5.

Due to the presence of different representations of virtualization infrastructure objects, access rights to some objects (VM, vApps) can be inherited from several ancestors (for example, VM folder and Resource Pool). what to keep in mind. The general scheme of inheritance is shown in the figure:


')
Accordingly, if you need to restrict someone, you need to make sure that the rights taken away in one place are not inherited from another object.

In addition, it can be encountered in practice that a person who has administrator authority at the root level suddenly finds himself limited by user rights at the level of a specific folder. The point is in the peculiarities of the choice of existing rights in the situation of imposing roles. When granting credentials you should keep them in mind.

1) Rights granted to child objects ignore inherited objects. In other words, if the user is a member of the vSphereAdmins and CitrixAdmins groups, the first one has admin rights at the root level, and the second VM User at the level of the Citrix folder, then we’ll get the situation described in the paragraph above.

2) Rights granted to a specific user prevail over rights granted to a group (if both are granted to one object and the user is included in the group).

3) If users are used from AD or from other sources other than the built-in vCenter SSO directory, vCenter periodically checks for an account by searching by name . And if after assignment of rights in vCenter, the account has been renamed or deleted, the corresponding rights from vCenter are deleted. And if in the case of remote registration it is even good, then if someone renamed a group (groups), for example, in accordance with the new naming policies in the organization, this could lead to adverse consequences.

4) vCenter SSO does not inherit the rights of nested groups if their members are not included in Identity Sources . For example, if an AD domain is not added to Identity Sources, then the Domain Admins group of this domain will have no authority on the vCenter, even if it belongs to the local \ Administrators of the vCenter server.

A few recommendations of the best dog breeders of Best Practices on the topic of granting access rights.



Finally, I will mention the specialized users of ESXi hosts. It was provoked by the fact that a colleague once decided to make sure that IT staff in some regions didn’t create any loopholes in the infrastructure, and almost got rid of ESXi-hosts from the vpxuser user.

vpxuser is a specialized user that is created when a host connects to vCenter and is used by it for administration. It has, respectively, administrative rights to the host and in no case should not be upgraded (do not change neither the right nor the password).

dcui user is another specific user used as an agent when working through the Direct Console User Interface mode of the host's lockdown mode (in this mode, any connections to the host are prohibited, except for management using vCenter).

As a conclusion, I want to note that I have never been so aware of the importance and relevance of the AGDLP approach in assigning access rights to the system, as when developing a policy for assigning rights to vCenter objects. In view of the above features and a large number of branching elements of hierarchies.

Source: https://habr.com/ru/post/249285/


All Articles