Created by Rick Schoenman
about 2 years ago
|
||
To establish fine-grained control of the IPAM implementation, RBAC can be used.
Which 3 layers of configuration can be managed using RBAC?
Describe an IPAM RBAC Role
Describe an IPAM RBAC Access Scope
Describe an IPAM RBAC Access Policy
There is a table listing the 9 IPAM security groups.