Use Method D v2.0 break glass access

Break glass access using Method D v2.0 is a streamlined approach for administrators to grant secure, emergency access to critical network fabric devices. This guide walks you through setting up and using break glass access, including generating SSH keys, granting permissions, and accessing network fabric devices.

Generating SSH Keys using the Nexusidentity Azure CLI

To start with break glass Identity and Access Management (IAM) configuration, you need to set up SSH keys using the Nexusidentity extension. Make sure you have the following prerequisites installed and updated.

Prerequisites

  • Setup Method D v2.0 using as referred in article
  • Windows Computer with PowerShell
  • OpenSSH: Version 9.4 or higher
  • Python: Version 3.11 or higher (64-bit)
  • Azure CLI: Version 2.61 or higher (64-bit)
  • Nexusidentity Extension: This extension must be added to Azure CLI.
  • YubiKey Firmware Version: Must be 5.2.3 or higher.
  • Enable Long paths - Windows long paths support must be enabled Refer.

Steps to Install Nexusidentity Extension and Generate SSH Keys

  1. Enabling long paths
  • Run the following PowerShell as an administrator.

    New-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\FileSystem" -Name "LongPathsEnabled" -Value 1 -PropertyType DWORD -Force
    
  • Close the PowerShell terminal.

  1. Open PowerShell:

Note

Use non-admin mode for this process.

  1. Update Azure CLI:

    • Run the following command to update Azure CLI to the latest version:

      az upgrade
      
  2. Install Nexusidentity extension:

    • To add the Nexusidentity extension

      az extension add --name nexusidentity
      
  3. Generate SSH Keys with Nexusidentity extension:

    a. Download the Yubico Key Manager to reset your YubiKey for initial setup.

    b. Attach your YubiKey to your computer.

    c. Log in to Azure with:

    az login
    

    d. Run the following command to generate SSH keys:

    az nexusidentity gen-keys
    

    Note

    Method Dv2.0 passkeys require the YubiKey hardware token with a firmware version of 5.2.3 or higher.

    e. During this process:

    • If prompted to overwrite keys in token, press Enter.

    • Select the Security Key in the popup window and follow the prompts.

    • Enter your YubiKey PIN and touch the device when prompted.

    • If prompted to overwrite keys- press Enter

    • If prompted to enter a passphrase, press Enter.

    f. After successful key generation, you should see:

       Successfully uploaded public key to Microsoft Entra Id account {user.mail}
    

Granting break-glass permissions to an Entra user on a Network Fabric

To enable break glass access, administrator can assign below roles to Entra users on a Network Fabric device.

  • Nexus Network Fabric Service Reader:

    • Allows the user to execute show commands on fabric devices.

    • Doesn't permit access to configuration mode.

  • Nexus Network Fabric Service Writer:

    • Allows show commands and commands to modify the running configuration.

Once these roles are assigned, the corresponding username and public SSH key are automatically provisioned across all devices within the designated fabric instance.

Note

If a subscription owner assigns an user, the Network Fabric Service Reader or Writer role at the subscription scope, this role assignment will be inherited by all Network Fabric instances. Consequently, the user will be granted the privileges associated with the built-in role across all Network Fabric instances.

Note

break glass user accounts are reconciled every 4 hours. For immediate reconciliation, open a support ticket with the network fabric support team.

Break-glass access to Network Fabric device

Once permissions are granted, users can access network fabric devices with their FIDO-2 hardware token (for example, YubiKey). Follow these steps to use break glass access.

  1. Prepare for access:

    • Make sure your FIDO-2 hardware token is plugged into your computer.
  2. Use SSH with the -J option:

    • The -J option enables you to log in through a jump server and access a fabric device directly. This process involves authentication first with the jump server and then with the fabric device using SSH keys.

    Use the following command format to access a fabric device:

    ssh -J JumpBoxUsername@JumpBoxIp EntraUsername@FabricDeviceIP
    

Note

This command establishes a secure connection, using the jump server as an intermediary for authentication.