Applies To:
Show VersionsBIG-IQ Centralized Management
- 6.0.0
Managing GSLB Objects
How do I manage permissions for DNS GSLB objects?
F5® BIG-IQ® Centralized Management makes it straightforward for you to manage permissions that allow users to view GSLB objects only for the specific DNS GSLB objects you assign to them.
To provide permissions for a specific set of objects, you perform the following tasks.
- Add a custom resource group - In this task, you specify the GSLB objects that you want this user to work with. You create a resource group for each collection of objects that you want to assign to a user.
- Add a custom role - Next, you associate the GSLB Viewer role type with the resource groups that contain the objects you want your delegates to view. For example, if you had a resource group made up of two wide IPs, one named SeattlePrime and the other named SeattleSecond you might name this role viewSeattle.
- Add a custom user - Finally, you create a user and assign a custom role to that user. The role gives that user permissions to view the objects that belong to the objects in the resource group. In the previous example, you could assign your custom user to the viewSeattle role to give that user the ability to view the GSLB objects in the two Seattle wide IPs.
For step by step guidance on each of these tasks, refer to How do I give users customized permissions to specific BIG-IP resources based on their job responsibilities? on support.f5.com