<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: read-only access for powershell toolkit in SolidFire and HCI</title>
    <link>https://community.netapp.com/t5/SolidFire-and-HCI/read-only-access-for-powershell-toolkit/m-p/146804#M18</link>
    <description>&lt;P&gt;You don't grant access to APIs, you grant access to cluster admins.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;PS /home/sean&amp;gt; get-help New-SFClusterAdmin -examples&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#0000FF"&gt;NAME&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;New-SFClusterAdmin&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;SYNOPSIS&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;[Cluster] Adds a new cluster admin.&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;-------------------------- EXAMPLE 1 --------------------------&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;PS C:\&amp;gt;New-SFClusterAdmin -Username AdminUser -Password NewPass -Access "nodes","drives"&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;Adds a cluster admin user with full access to the "nodes" and "drives" groups of API methods.&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;The most common access levels are:&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;"administrator" - Full access to all API methods&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;"reporting" - Access to only readonly API methods with some limitations&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Add one of these reporting accounts. Whatever this guy does, the only thing he can do is Get-*.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#0000FF"&gt;PS /home/sean&amp;gt; New-SFClusterAdmin -Username DirkD -Password B00GInites -AcceptEula:$true -Access reporting&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;AuthMethod : Cluster&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;Access : {administrator}&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;ClusterAdminID : 1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;Username : admin&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;Attributes :&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#0000FF"&gt;AuthMethod : Cluster&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;Access : {read, reporting, volumes}&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;ClusterAdminID : 6&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;Username : sean&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;Attributes : {}&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#0000FF"&gt;AuthMethod : Cluster&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;Access : {read, reporting}&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;ClusterAdminID : 7&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;Username : DirkD&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;Attributes : {}&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;Now this&amp;nbsp;account can Get-* all sorts of info including this below.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#0000FF"&gt;PS /home/sean&amp;gt; Connect-SFCluster 192.168.1.30 -Username DirkD -Password B00GInites &lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#0000FF"&gt;PS /home/sean&amp;gt; Get-SFAccount -AccountID 1&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;AccountID : 1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;Username : vcenter&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;Status : active&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;Volumes : {5, 6}&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;InitiatorSecret : WOWWOWWOW&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;TargetSecret : 0dD':6n9T4$:.UB3&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But at least some things are off limits.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#0000FF"&gt;PS /home/sean&amp;gt; Get-SFClusterAdmin &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF6600"&gt;Get-SFClusterAdmin : xPermissionDenied: xPermissionDenied&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF6600"&gt;At line:1 char:1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF6600"&gt;+ Get-SFClusterAdmin&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF6600"&gt;+ ~~~~~~~~~~~~~~~~~~&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF6600"&gt;+ CategoryInfo : InvalidResult: (SolidFire.Cluster.Get.GetSFClusterAdmin:GetSFClusterAdmin) [Get-SFClusterAdmin], Exception&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF6600"&gt;+ FullyQualifiedErrorId : 0,SolidFire.Cluster.Get.GetSFClusterAdmin&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF6600"&gt;StorageContainerID : 00000000-0000-0000-0000-000000000000&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF6600"&gt;Attributes : {}&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;If you want to prevent read-access to iSCSI accounts and passwords, you could set up one PS script to run as User A, and save output to a folder owned by User B, that way you can control what info is accesseed through User A, and User B could be normal staff without access to sensitive data.&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 26 Feb 2019 15:38:43 GMT</pubDate>
    <dc:creator>elementx</dc:creator>
    <dc:date>2019-02-26T15:38:43Z</dc:date>
    <item>
      <title>read-only access for powershell toolkit</title>
      <link>https://community.netapp.com/t5/SolidFire-and-HCI/read-only-access-for-powershell-toolkit/m-p/146798#M17</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Does anyone have a definitive list of the APIs that need to be granted to allow read-only access from powershell? We're trying to automate reporting, but we need to ensure there is no possibility of the script changing anything.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any and all advice gratefully received.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Eamonn&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2025 12:48:05 GMT</pubDate>
      <guid>https://community.netapp.com/t5/SolidFire-and-HCI/read-only-access-for-powershell-toolkit/m-p/146798#M17</guid>
      <dc:creator>EamonnH</dc:creator>
      <dc:date>2025-06-04T12:48:05Z</dc:date>
    </item>
    <item>
      <title>Re: read-only access for powershell toolkit</title>
      <link>https://community.netapp.com/t5/SolidFire-and-HCI/read-only-access-for-powershell-toolkit/m-p/146804#M18</link>
      <description>&lt;P&gt;You don't grant access to APIs, you grant access to cluster admins.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;PS /home/sean&amp;gt; get-help New-SFClusterAdmin -examples&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#0000FF"&gt;NAME&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;New-SFClusterAdmin&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;SYNOPSIS&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;[Cluster] Adds a new cluster admin.&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;-------------------------- EXAMPLE 1 --------------------------&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;PS C:\&amp;gt;New-SFClusterAdmin -Username AdminUser -Password NewPass -Access "nodes","drives"&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;Adds a cluster admin user with full access to the "nodes" and "drives" groups of API methods.&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;The most common access levels are:&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;"administrator" - Full access to all API methods&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;"reporting" - Access to only readonly API methods with some limitations&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Add one of these reporting accounts. Whatever this guy does, the only thing he can do is Get-*.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#0000FF"&gt;PS /home/sean&amp;gt; New-SFClusterAdmin -Username DirkD -Password B00GInites -AcceptEula:$true -Access reporting&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;AuthMethod : Cluster&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;Access : {administrator}&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;ClusterAdminID : 1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;Username : admin&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;Attributes :&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#0000FF"&gt;AuthMethod : Cluster&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;Access : {read, reporting, volumes}&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;ClusterAdminID : 6&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;Username : sean&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;Attributes : {}&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#0000FF"&gt;AuthMethod : Cluster&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;Access : {read, reporting}&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;ClusterAdminID : 7&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;Username : DirkD&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;Attributes : {}&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;Now this&amp;nbsp;account can Get-* all sorts of info including this below.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#0000FF"&gt;PS /home/sean&amp;gt; Connect-SFCluster 192.168.1.30 -Username DirkD -Password B00GInites &lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#0000FF"&gt;PS /home/sean&amp;gt; Get-SFAccount -AccountID 1&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;AccountID : 1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;Username : vcenter&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;Status : active&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;Volumes : {5, 6}&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;InitiatorSecret : WOWWOWWOW&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;TargetSecret : 0dD':6n9T4$:.UB3&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But at least some things are off limits.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#0000FF"&gt;PS /home/sean&amp;gt; Get-SFClusterAdmin &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF6600"&gt;Get-SFClusterAdmin : xPermissionDenied: xPermissionDenied&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF6600"&gt;At line:1 char:1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF6600"&gt;+ Get-SFClusterAdmin&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF6600"&gt;+ ~~~~~~~~~~~~~~~~~~&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF6600"&gt;+ CategoryInfo : InvalidResult: (SolidFire.Cluster.Get.GetSFClusterAdmin:GetSFClusterAdmin) [Get-SFClusterAdmin], Exception&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF6600"&gt;+ FullyQualifiedErrorId : 0,SolidFire.Cluster.Get.GetSFClusterAdmin&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF6600"&gt;StorageContainerID : 00000000-0000-0000-0000-000000000000&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF6600"&gt;Attributes : {}&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;If you want to prevent read-access to iSCSI accounts and passwords, you could set up one PS script to run as User A, and save output to a folder owned by User B, that way you can control what info is accesseed through User A, and User B could be normal staff without access to sensitive data.&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Feb 2019 15:38:43 GMT</pubDate>
      <guid>https://community.netapp.com/t5/SolidFire-and-HCI/read-only-access-for-powershell-toolkit/m-p/146804#M18</guid>
      <dc:creator>elementx</dc:creator>
      <dc:date>2019-02-26T15:38:43Z</dc:date>
    </item>
    <item>
      <title>Re: read-only access for powershell toolkit</title>
      <link>https://community.netapp.com/t5/SolidFire-and-HCI/read-only-access-for-powershell-toolkit/m-p/146813#M19</link>
      <description>&lt;P&gt;Hi Eamonn,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The first response to your question appears to be based on NetApp Solidfire? Could you please specify what systems you are trying to automate reporting for? If you want to automate reporting for Clustered DATA ONTAP then it would make more sense create a read-only database user in OCUM used for querying to the information that OCUM has already discovered about the clusters in your environment rather than invoke API's to query the clusters directly.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you want to automate reporting for Clustered Data ONTAP systems then the following may be of interest to you:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A title="https://blog.netapp.com/more-ways-to-extract-the-data-you-need-from-oncommand-unified-manager/" href="https://blog.netapp.com/more-ways-to-extract-the-data-you-need-from-oncommand-unified-manager/" target="_blank" rel="noopener"&gt;https://blog.netapp.com/more-ways-to-extract-the-data-you-need-from-oncommand-unified-manager/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A title="https://www.netapp.com/us/media/tr-4565.pdf" href="https://www.netapp.com/us/media/tr-4565.pdf" target="_blank" rel="noopener"&gt;https://www.netapp.com/us/media/tr-4565.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;/Matt&lt;/P&gt;</description>
      <pubDate>Tue, 26 Feb 2019 22:31:01 GMT</pubDate>
      <guid>https://community.netapp.com/t5/SolidFire-and-HCI/read-only-access-for-powershell-toolkit/m-p/146813#M19</guid>
      <dc:creator>mbeattie</dc:creator>
      <dc:date>2019-02-26T22:31:01Z</dc:date>
    </item>
    <item>
      <title>Re: read-only access for powershell toolkit</title>
      <link>https://community.netapp.com/t5/SolidFire-and-HCI/read-only-access-for-powershell-toolkit/m-p/146816#M20</link>
      <description>&lt;P&gt;&amp;gt;&amp;nbsp;&lt;SPAN&gt;The first response to your question appears to be based on NetApp Solidfire?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Well, the question has been posted under&amp;nbsp;&lt;A href="https://community.netapp.com/t5/SolidFire-PowerShell-Discussions/.&amp;nbsp;" target="_blank"&gt;https://community.netapp.com/t5/SolidFire-PowerShell-Discussions/.&amp;nbsp;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If it's ment for another section perhaps it could be re-posted (with additional detail) to the right area of the forums to lessen the confusion.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Feb 2019 00:34:22 GMT</pubDate>
      <guid>https://community.netapp.com/t5/SolidFire-and-HCI/read-only-access-for-powershell-toolkit/m-p/146816#M20</guid>
      <dc:creator>elementx</dc:creator>
      <dc:date>2019-02-27T00:34:22Z</dc:date>
    </item>
    <item>
      <title>Re: read-only access for powershell toolkit</title>
      <link>https://community.netapp.com/t5/SolidFire-and-HCI/read-only-access-for-powershell-toolkit/m-p/146817#M21</link>
      <description>&lt;P&gt;Didn't notice that when i replied. A fair and valid point &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.netapp.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;/Matt&lt;/P&gt;</description>
      <pubDate>Wed, 27 Feb 2019 00:38:56 GMT</pubDate>
      <guid>https://community.netapp.com/t5/SolidFire-and-HCI/read-only-access-for-powershell-toolkit/m-p/146817#M21</guid>
      <dc:creator>mbeattie</dc:creator>
      <dc:date>2019-02-27T00:38:56Z</dc:date>
    </item>
    <item>
      <title>Re: read-only access for powershell toolkit</title>
      <link>https://community.netapp.com/t5/SolidFire-and-HCI/read-only-access-for-powershell-toolkit/m-p/146818#M22</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;One option to consider (that actually relates to solidfire&amp;nbsp;&lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.netapp.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt; ) and assuming you have WFA in your environment would be to add the solidfire system (or systems) to WFA using this pack from the automation store:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A title="https://automationstore.netapp.com/pack-detail.shtml?packUuid=cac25243-4e66-4630-a58d-ee16c7d93217&amp;amp;packVersion=1.0.0" href="https://automationstore.netapp.com/pack-detail.shtml?packUuid=cac25243-4e66-4630-a58d-ee16c7d93217&amp;amp;packVersion=1.0.0" target="_blank" rel="noopener"&gt;https://automationstore.netapp.com/pack-detail.shtml?packUuid=cac25243-4e66-4630-a58d-ee16c7d93217&amp;amp;packVersion=1.0.0&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Once the solidfire system\systems are aquired by the WFA datasource the configuration of your systems will reside in the "solidfire" database on the WFA server which you could query as a read only user. This way you wouldn't need to provide any API access directly to the solidfire systems directly for reporting purposes although the solidfire credentials to acquire the datasource would need to be configured within WFA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;/Matt&lt;/P&gt;</description>
      <pubDate>Wed, 27 Feb 2019 01:08:32 GMT</pubDate>
      <guid>https://community.netapp.com/t5/SolidFire-and-HCI/read-only-access-for-powershell-toolkit/m-p/146818#M22</guid>
      <dc:creator>mbeattie</dc:creator>
      <dc:date>2019-02-27T01:08:32Z</dc:date>
    </item>
  </channel>
</rss>

