Hitachi

JP1 Version 12 JP1/Network Node Manager i Setup Guide


14.4.2 Configuring multi-tenancy

NNMi provides the following ways to configure multi-tenancy:

The process of defining and configuring NNMi multi-tenancy to assign each NNMi topology object to a tenant (organization) is a cyclical process.

Note the following about configuring NNMi multi-tenancy:

One high-level approach to planning and configuring NNMi multi-tenancy is as follows:

  1. Analyze your customer requirements to determine how many tenants are required in the NNMi environment.

    We recommend that tenants be used only when managing multiple separate networks with a single NNMi management server.

  2. Analyze the managed network topology to determine which nodes belong to each tenant.

  3. Analyze the topology of each tenant to determine the groups of nodes to which NNMi users need access.

  4. Remove the default associations between the predefined NNMi user groups and the Default Security Group and Unresolved Incidents security group.

    This step ensures that users do not inadvertently obtain access to nodes they are not supposed to be managing. At this point, only NNMi administrators can access objects in the NNMi topology.

  5. Configure the identified tenants.

    a. Create the identified security groups.

    b. Create the identified tenants.

    For each tenant, set the Initial Discovery Security Group to either the Default Security Group or a tenant-specific security group with restricted access. This approach ensures that new nodes for the tenant are not generally visible until the NNMi administrator configures access.

  6. Prepare for discovery by assigning tenants to seeds.

    After discovering a group of nodes, you can change the value of the Initial Discovery Security Group. Using this approach limits the manual re-assignment of nodes to security groups.

  7. After discovery completes, do the following:

    • Verify the tenant for each node and make changes as necessary.

    • Verify the security group for each node and make changes as necessary.

  8. Configure custom user groups.

    For details about configuring custom user groups, see 14.4.4 Verifying the configuration.