NSX administration interface identity and access management
The following main principles or requirements apply:
Infrastructure Admin
hasexecute
andfull access
to all components.Auditor
has read-only access to all components.
NSX role mapping
VMware NSX™ component | Auditor | Infrastructure admin |
---|---|---|
Controllers | Read | Full |
Transport Nodes | Read | Full |
Edge Nodes | Read | Full |
Segments - VLAN | Read | Full |
Segments - Overlay | Read | Full |
T0 - Tenant | Read | Full |
T0 - Transit | Read | Full |
T0 - Management | Read | Full |
T1s - Tenant | Read | Full |
T1s - Services | Read | Full |
T1s - Management | Read | Full |
The roles and privileges for load balancing, firewall rules, and VPN services follow the T0/T1 roles and privileges.
NSX roles
NSX Data Center has the following built-in roles. You cannot add any new roles.
- Enterprise administrator
- Auditor
- Network engineer
- Network operations
- Security engineer
- Security operations
- Load balancer administrator
- Load balancer auditor
- VPN administrator
- Guest introspection administrator
- Network introspection administrator
NSX user interface user IDs
User | User ID | Description |
---|---|---|
Privileged user | admin |
Used post-deployment to manage NSX VTEP IP addresses and to manage host and cluster configuration when hosts and clusters are added and removed. Also, used to manage ESG configuration for services that require public network access for licensing, activation, or usage reporting. |
IBM automation | automation_admin |
Automation account used by IBM. It uses the principle identity functions to create configuration and protect it with a certificate. |
For more information, see the Role-Based Access Control for NSX.