Cloudify provides a user management mechanism, so you can define different users with different permissions, and upon login perform authentication and authorization to control the users’ access to resources.
The users can be either defined and managed in Cloudify itself, or you can configure your Manager to integrate with an LDAP-based user-management system.
You must select one of these options, as you cannot do both, and you must configure your manager accordingly upon installation or immediately afterwards, when no actions were performed on it yet.
User management can be performed using the CLI or the Cloudify Management Console.
You must have Cloudify Manager administrator permissions to perform user-management related actions.
Managing users in Cloudify Manager
If you choose not to integrate with an external user-management system, you can manage your Cloudify users on the manager itself, either by the CLI commands or the User Management widget in the Cloudify Management Console. You can create users, add them to user-groups, assign them with tenants under specific roles, deactivate and delete them.
Managing users by Integrating with an LDAP System
To integrate the Cloudify Management Console with an LDAP user repository, please follow these directions
Adding Users Manually
If you choose not to integrate Cloudify Manager with LDAP systems, you must add each user individually and set a password for them. You can also create user-groups and add users to them. The users and user groups can be assigned to one or more tenants.
For more information, see the users and user-groups commands in the CLI documentation.
You can add and remove users and user groups to/from a specific tenant. To run these user-related tenant-specific commands, use
cfy tenant. For more information, see the tenants command in the CLI documentation.
add-userenables you to add an individual user to a tenant
add-user-groupenables you to add a user groups to a tenant
createenables you to create a tenant
deleteenables you to delete a tenant
getenables you to view information about a tenant, including its users
listdisplays a list of all tenants in this instance of Cloudify Manager. By default, when you generate the list of tenants, only the number of linked user-groups and users is displayed. You can retrieve full details with the use of a
remove-userenables you to remove a specific user from a tenant
remove-user-groupenables you to remove a user group from a tenant
How to assign a role to user
When a user is added to a tenant, a Role must be assigned to it by passing a valid value in the
cfy tenant add-user -r <role name> ...adding a user to a tenant, and give him a role.
cfy tenant add-user-group -r <role name> ...adding a user-group to a tenant, and give it a role.
cfy users set-role <role-name>setting the user system role
User Account Lock
Cloudify lets admins enforce an account lock after a user fails for a specified number of login attempts. After an account is locked the user must wait the specified time period before another login attempt, or the admin can unlock the user account.
You can configure the account lock in the Cloudify Manager either:
Before you start to use the Cloudify Manager - Before you install the Cloudify Manager or after you install the Cloudify Manager, you can set the account lock settings in the config.yaml file. After you install or configure the Cloudify Manager, the account lock is enforced.
After you start to use the Cloudify Manager - Edit the account lock settings in the rest service configuration file at
/opt/manager/rest-security.conf. To enforce the account lock, restart the Cloudify rest service:
systemctl restart cloudify-restservice
User Lock Settings
In either the config.yaml file or the REST service configuration, set these account lock settings:
failed_logins_before_account_lock- Number of failed logins (bad password) before account lock.
account_lock_period- Account lockout time in minutes.
-1disables account lockout even when
failed_logins_before_account_lockhas a value.
Unlocking a user
Cloudify admins can unlock a user account with the command:
cfy users unlock <username>