Book Image

Implementing Cisco UCS Solutions - Second Edition

By : Anuj Modi, Prasenjit Sarkar
Book Image

Implementing Cisco UCS Solutions - Second Edition

By: Anuj Modi, Prasenjit Sarkar

Overview of this book

Cisco Unified Computer System (UCS) is a powerful solution for modern data centers and is responsible for increasing efficiency and reducing costs. This hands-on guide will take you through deployment in Cisco UCS. Using real-world examples of configuring and deploying Cisco UCS components, we’ll prepare you for the practical deployments of Cisco UCS data center solutions. If you want to develop and enhance your hands-on skills with Cisco UCS solutions, this book is certainly for you. We start by showing you the Cisco UCS equipment options then introduce Cisco UCS Emulator so you can learn and practice deploying Cisco UCS components. We’ll also introduce you to all the areas of UCS solutions through practical configuration examples. Moving on, you’ll explore the Cisco UCS Manager, which is the centralized management interface for Cisco UCS. Once you get to know UCS Manager, you’ll dive deeper into configuring LAN, SAN, identity pools, resource pools, and service profiles for the servers. You’ll also get hands-on with administration topics including backup, restore, user’s roles, and high availability cluster configuration. Finally, you will learn about virtualized networking, third-party integration tools, and testing failure scenarios. By the end of this book, you’ll know everything you need to know to rapidly grow Cisco UCS deployments in the real world.
Table of Contents (20 chapters)
Title Page
Credits
About the Authors
www.PacktPub.com
Customer Feedback
Preface

RBAC


UCS RBAC provides granular control over the user security privileges. Combined with UCS organizations, RBAC delegates and controls the user access privileges according to the role and restricts user access within an organization boundary defined for the tenant in case of multitenancy.

Access privileges provide the users with the capability to create, modify, or delete a specific type of configuration. UCS provides some predefined roles and it is also possible to create custom roles based on requirements. The roles are a collection of different privileges. Hence, roles can be assigned to users according to their job requirements. For example, there's a built-in role called read-only that provides only read privileges to the user. This role can be assigned to any user to whom you do not want to provide any configuration capability.

In UCS, a user's authentication can be configured from various resources including the following:

  • Local user
  • LDAP (Active Directory, OpenLDAP, and so on)
  • RADIUS...