HPE OneView uses a combination of roles and scopes to control what users can do and which resources they can access. Roles define the type of access (create, read, update, delete) to a resource category. Scopes restrict that access to a specific subset of resources within a category.Documentation Index
Fetch the complete documentation index at: https://mintlify.com/HewlettPackard/POSH-HPEOneView/llms.txt
Use this file to discover all available pages before exploring further.
Roles
A role grants a user rights to a resource category. For example, theServer administrator role grants read, create, delete, update, and use rights to the server hardware category.
Roles are assigned to local users (via Set-OVUser) or to directory groups (via Set-OVLdapGroupRole).
Built-in roles
HPE OneView provides the following built-in roles. The full list of roles supported by a connected appliance is available in theApplianceSecurityRoles property of the connection object.
Infrastructure Administrator
Infrastructure Administrator
Full access to all appliance resources and configuration. Can create and manage users, scopes, authentication directories, and appliance settings. This is the highest-privilege role.
Server Administrator
Server Administrator
Read, create, delete, update, and use rights to server hardware, server profiles, and server profile templates. Typically assigned to teams responsible for compute lifecycle.
Network Administrator
Network Administrator
Read, create, delete, and update rights to Ethernet networks, Fibre Channel networks, network sets, logical interconnects, logical interconnect groups, and uplink sets.
Storage Administrator
Storage Administrator
Read, create, delete, and update rights to storage systems, storage pools, storage volumes, and volume templates.
Firmware Administrator
Firmware Administrator
Rights to upload and manage firmware baselines and apply firmware updates to managed resources.
Backup Administrator
Backup Administrator
Rights to create and manage appliance backups and restore operations.
Scope Administrator
Scope Administrator
Rights to create, update, and delete scopes, and to assign resources to scopes. Can also assign scope-based permissions to users and groups, limited to the scopes they administer.
Read only
Read only
Read-only access to all resources. Cannot create, update, or delete any resource.
To retrieve the exact list of roles supported by your connected appliance, inspect
$ConnectedSessions[0].ApplianceSecurityRoles.Scopes
A scope is a named collection of resources. When a permission is assigned with a scope, the role rights are restricted to only the resources that are members of that scope. For example, if aServer administrator permission is assigned with a scope named Site A, the user can only manage server hardware that has been added to the Site A scope. Servers outside that scope are invisible to the user.
Resource types that support scoping
The following resource categories can be added to scopes:- Enclosures
- Server hardware
- Networks (Ethernet, FC, and FCoE)
- Network sets
- Interconnects (excluding SAS resources)
- Logical interconnects (excluding SAS resources)
- Logical interconnect groups (excluding SAS resources)
- Switches
- Logical switches
- Logical switch groups
Role-based vs scope-based permissions
| Concept | What it controls |
|---|---|
| Role only | Access type (read/write/delete) to an entire resource category across all resources |
| Role + Scope | Access type restricted to the named subset of resources within that category |
Site A Admins scope.
Managing scopes
Retrieving scopes
UseGet-OVScope to retrieve existing scopes:
Creating a scope
UseNew-OVScope to create a new scope:
Only users with the
Infrastructure Administrator or Scope Administrator role can create scopes. Scope Administrators can only manage scopes that they administer.Adding resources to a scope
UseAdd-OVResourceToScope to assign resources to a scope. Resources must be of a supported type (see the list above).
-Async switch to return a task object instead of waiting:
Using -Scope to filter cmdlet output
Cmdlets for scope-supported resource types accept a-Scope parameter that filters returned objects to only those belonging to the specified scope:
-Scope, these cmdlets return all resources visible to the authenticated user based on their active permissions.
See also
- Connection permissions — Reduce session privileges with Push-OVAppliancePermission
- Two-factor authentication — Authenticate with smart cards and examine scoped permissions
Get-Help Get-OVScopeGet-Help New-OVScopeGet-Help Add-OVResourceToScopeGet-Help Set-OVUserGet-Help Set-OVLdapGroupRole