Creado por Rick Schoenman
hace alrededor de 2 años
|
||
To establish fine-grained control of the IPAM implementation, RBAC can be used.
Which 3 layers of configuration can be managed using RBAC?
Describe an IPAM RBAC Role
Describe an IPAM RBAC Access Scope
Describe an IPAM RBAC Access Policy
There is a table listing the 9 IPAM security groups.