C H A P T E R
8
Configuring User Accounts and RBAC
This chapter describes how to configure user accounts and role-based access control (RBAC) on Cisco NX-OS
devices.
This chapter includes the following sections:
•
About User Accounts and RBAC, on page 155
•
Licensing Requirements for User Accounts and RBAC, on page 158
•
Guidelines and Limitations for User Accounts and RBAC, on page 158
•
Default Settings for User Accounts and RBAC, on page 159
•
Enabling Password-Strength Checking, on page 159
•
Configuring User Accounts, on page 160
•
Configuring Roles, on page 162
•
About No Service Password-Recovery, on page 171
•
Enabling No Service Password-Recovery, on page 171
•
Verifying User Accounts and RBAC Configuration, on page 172
•
Configuration Examples for User Accounts and RBAC, on page 173
•
Additional References for User Accounts and RBAC, on page 174
About User Accounts and RBAC
You can create and manage users accounts and assign roles that limit access to operations on the Cisco NX-OS
device. RBAC allows you to define the rules for an assign role that restrict the authorization that the user has
to access management operations.
User Accounts
You can configure up to a maximum of 256 user accounts. By default, the user account does not expire unless
you explicitly configure it to expire. The expire option determines the date when the user account is disabled.
The following words are reserved and cannot be used to configure users: bin, daemon, adm, lp, sync, shutdown,
halt, mail, news, uucp, operator, games, gopher, ftp, nobody, nscd, mailnull, root, rpc, rpcuser, xfs, gdm,
mtsuser, ftpuser, man, and sys.
User passwords are not displayed in the configuration files.
Note
Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x
155