RBAC

Nexus Dashboard

Nexus Dashboard RBAC Configuration Guide for Cluster nd03-2

Following the Role-Based Access Control (RBAC) configuration for the first Nexus Dashboard cluster (nd03-1), this guide outlines the equivalent process for the second cluster, nd03-2. The steps mirror the previous configuration with minor adjustments for the new cluster.

Step 1 - Login to Nexus Dashboard nd03-2

Launch a new browser instance or tab to access the Nexus Dashboard for cluster nd03-2.

At the login screen, enter the following credentials to authenticate:

  • Username: admin
  • Password: cisco.123


Step 2 - RBAC Configuration - nd03-2

  1. Click Admin in the left navigation bar
  2. Click Users and Security


  3. Click Authentication
  4. Click Create login domain


  5. Name: cl-ise
  6. Realm: Select TACACS+
  7. Click Add Provider


  8. Hostname/IP address: 10.3.0.10
  9. Key: cisco.123
  10. Confirm Key: cisco.123
  11. Username: pod3u1
  12. Password: cisco.123
  13. Click Save


  14. Click Save


Step 3 - Setup Default Login Domain Authentication - nd03-2

To streamline future logins, configure the default login domain authentication to cl-ise, the TACACS+ login domain established previously.


  1. Click: Edit

  2. Select: cl-ise
  3. Click: Save

Upon saving, the Nexus Dashboard will return to the Users and Security page, displaying the updated default authentication method.

Step 4 - Verify RBAC - nd03-2

After configuring RBAC services for nd03-2, verify functionality by logging out and back in with the appropriate credentials.

  1. Click Admin in the top right corner of the page
  2. Click Logout


  3. User Name: pod3u1
  4. Password: cisco.123
  5. Login Domain cl-ise
  6. Click Login

Upon successful login, the user interface should display your username, pod3u1, as shown below.


Summary

You configured RBAC on the second Nexus Dashboard cluster using the same ISE/TACACS+ integration as ND1. Having consistent authentication across both clusters means administrators use one set of credentials to manage the entire multi-site environment. ND makes it straightforward to replicate security policies across clusters.

Proceed to the next section: Nexus Dashboard Device Credentials.