Security Model - Users, Roles, and Privileges
This course is a deep dive of the Nexus Repository Manager (NXRM) security model, focusing on the administration of users, privileges, and roles. It is one course in a series available in the Security track, as part of NXRM Advanced Certification. While this course might introduce topics covered in other courses, at the completion of this course, you’ll be ready to manage all things related to users, privileges, and roles within NXRM3.
This module provides practice only, and should not be used to administer your production repository.
This course will help you streamline the administration and management of your NXRM to avoid unnecessary overhead by starting out on the right path. Strategic upfront planning of assigning privileges to users and roles will get you there. Nexus Repository Manager 3 enables administrators with very fine-grained control over user rights to:
read from a repository or a subset of repositories
administer the repository manager or specific parts of the configuration
access specific parts of the user interface
deploy to repositories or even just specific sections of a repository
NXRM3 comes with default roles, users, and a standard set of permissions. As your security requirements evolve, you will likely need to customize security settings to create protected repositories for multiple departments or development groups. Nexus Repository Manager provides a security model that can adapt to any scenario.
In this course, we will discuss many common scenarios, and walk through the steps required to customize security settings.
Before beginning, there are a few important points we thought you should know. In order to be most successful, and avoid common pitfalls, do these things first:
- Make a plan - create a strategic plan upfront as to how you will assign roles and privileges for your organization.
- Create a backup - before working in your live environment, create a backup. Many of the steps you'll complete have no "undo" option.
By the end of this lesson, you will be able to:
- Identify the default users, roles, and key built-in privileges
- Create and manage users
Create and manage roles
Map NXRM roles to external user groups (LDAP in this example)
Assign privileges and users to roles
This lesson assumes learners are familiar with all of the concepts covered in the Security Essentials course.
The target audience for this course is the Repository Administrator, and anyone who wants to learn more about users, roles, and privileges in the NXRM3 security model.
Demo version of NXRM3 - Download and install a test environment for the purpose of this lesson if you do not already have one installed.
Learners will successfully streamline the administration and management of access control in NXRM3 by using best practices when creating and managing users, privileges, and roles. This will be accomplished by understanding privileges and their actions when assigned to users and roles, and how those are used to create protected repositories for multiple departments or development groups.
We will discuss in depth how to create and manage users, privileges, and roles in order to manage security and access control of your NXRM3. We will also touch on, but not take a deep dive into:
- configuring LDAP (realms)
- architecture options for NXRM3
- common NXRM architectures
As these are all critical aspects of the NXRM security model, they are covered in greater detail in separate courses of the Security Track.
Refer to our Glossary for more information on any of the terms used throughout this course.