Created by Rick Schoenman
about 2 years ago
|
||
Question | Answer |
To establish fine-grained control of the IPAM implementation, RBAC can be used. Which 3 layers of configuration can be managed using RBAC? | - Roles - Access Scopes - Access Policies |
Describe an IPAM RBAC Role | A role is a collection of IPAM operations. 9 roles are built-in, but custom ones can be created |
Describe an IPAM RBAC Access Scope | An Access Scope determines the objects to which a user has access to. the 'Global' Access Scope, grants access to all objects in IPAM. |
Describe an IPAM RBAC Access Policy | An Access Policy combines a Role with a Access Scope. |
There is a table listing the 9 IPAM security groups. | . |
Want to create your own Flashcards for free with GoConqr? Learn more.