2.1. Enterprise Cloud Customer Portal

An Enterprise Cloud Customer Portal (called the “Customer Portal” below) is available to users for managing services. You can use the Customer Portal to create Virtual Machines and configure your network environment in real time.
A diagram of the Enterprise Cloud Customer Portal ver2.0 usage is shown below.
../../_images/image10.png

Note

  • The Customer Portal is accessed using HTTPS communication through a web browser. Access to the Customer Portal requires authentication using the ID and password that you have been issued.
NTT Communications Business Portal
Enterprise Cloud is a service that is compatible with the NTT Communications Business Portal. You need to submit a separate application to use the service in conjunction with the Business Portal.
If you are using the service through the Business Portal, the authentication methods and user management procedures are different to those explained in this document. For details, refer to the “NTT Communications Business Portal User’s Guide” available separately.

2.1.1. Available Features

You can use the following features in the Customer Portal.
Feature Overview
Feature for batch management of multiple Data Centers. You can manage multiple Data Centers as a batch.
Portal Feature User Management You can create and manage user accounts for accessing the Customer Portal.
Ticket Feature*1 You can share information between you and NTT Communications, such as support assistance, communication regarding errors, and inquiries.
Permission Management You can manage resource properly by using Permission Management function.
Operation log You can refer to and download the operation history of the Customer Portal.
Control Feature Virtual Resource Control

You can control the following resources.

  • Add and delete Compute Resources (CPUs/Memory/etc.)
  • Build, change, and delete Virtual Machines
  • Monitor and graphically display Compute Resources and Virtual Machines
  • Change the resources and set policies for firewalls and load balancers
  • Add and change and terminate Internet Connectivity. *2
  • Add and delete Server Segment*2.
  • Change VPN Connectivity. *2
Console Connectivity You can perform a console connection with a Virtual Machine using a web browser.
Backup control You can control the data synchronization process (boost process) between the primary storage and backup storage between Data Centers.
*1 When using remote Data Centers without local Data Center, Customer Portal Ticket is not available. Please refer to 8.2.1 Support Center/Technical Help Desk.
*2 Available in Customer Portal function activated Data Center.

Note

  • Access to the Customer Portal requires authentication using an ID and password.

2.1.2. List of Items That Can Be Controlled

You can use the following operations in the Customer Portal.
Name of Menu/Feature Create/Execute Display Change Delete
Compute Resource Pool Compute Resource CPU - Y Y -
Memory - Y Y -
Storage - Y Y -
Resource Pool Y Y Y Y
Monitoring - Y - -
Public Catalog Virtual Machine Template/ vApp Template - Y - -
Private Catalog Resource (Storage Capacity) Y Y Y Y
Template Y Y - Y
Download Template Y - - -

Take a Virtual Machine Template

(OVA File)

Upload Y - - -
Virtual Machine/vApp*4 Create a Virtual Machine/vApp Private Catalog Y - - -
Use a Template - - - -
Public Catalog Y - - -
Use a Template - - - -
Resource vCPU - Y Y -
Memory - Y Y -
Number of Disks Y Y - Y
Disk Capacity - Y Extension -
vNIC (Select the Layout Segment) Y Y - -
Powered On, Powered Off, Reset, Shutdown, Suspend, Restart Y Y - -
Snapshot*5 Y Y - -
Console Connectivity Y Y - -
ISO Image Mount Feature*6 Y - - -
Install/Update VMware Guest Tools Y - - -
Set Guest Customization Enabled Y - - -
Enable Windows OS SID Modification Feature Y - - -
Check Hardware Version Y - - -
Upgrade Hardware Version*7 Y - - -
Monitoring, Log - Y - -
Image Backup Y Y Y Y
File Backup Y*1 Y Y Y
Internet Connectivity*2 Y Y Y Y
VPN Connectivity *3 Bandwidth - Y Y -
Ping Y - - -
Routing Information Y Y Y Y
Server Segment Segment Management*2 Y Y - Y
IP Address Management Y Y Y -
Interconnectivity Service Interconnectivity - Y - -
Collocation Connectivity - Y

Link(On/Off),

VLAN(Add/Delete)

-
vFirewall vFirewall Installation (Required) - - - -
Network Configuration - Y - -
Resource Level - Y Y -
Address or Object/Group Y Y Y Y
Service or Object/Group Y Y Y Y
Filtering Rules Y Y Y Y
NAT/NAPT Y Y Y Y
GIP - Y - -
Routing Y Y Y Y
Performance Information - Y - -
vLoad Balancer vLoad Balancer Installation Y Y - Y
Network Configuration - Y - -
Resource Level - Y Y -
Contract Resources - Y - -
Routing Y Y Y Y
Health Check Y Y Y Y
Real Server Settings Y Y Y Y
Server Group Settings Y Y Y Y
VIP Y Y Y Y
Monitoring Y Y Y Y
Global File Storage(Global Data Backup) Disk Capacity - Y - -
Boost Plan (S, M, L) - Y - -
Boost Y Y Y Y
Replication Y Y Y Y
*1 File Backup Restore control is provided by the application installed in Virtual Machine.
*2 The function is available on the Customer Portal the service released Data Center. The number of Global IP address can be changed in case of using vFirewall.
*3 The function is available on the Customer Portal the service released Data Center.
*4 vApp is a new feature that can be seen on Customer Portal ver2.0. vApp for Enterprise Cloud can only support one single Virtual Machine.
*5 About availability in each Data Center, please refer to Section 3.1.6 Snapshot.
*6 ISO Image Mount Feature is not available in Console Connectivity (HTML version).
*7 This function is available on Powered Off state. It is necessary for customers to check system operation after upgrade. NTT Communications does not provide support for relating upgrade. So we recommend using Image Backup or snapshot function in advance.

Availability of Customer Portal functions in each Data Center.
  JP     US UK FR ES SG HK MY TH
  Yokohama No.1 Kansai1 Saitama No.1 Lundy              
Server Segment(Add, Delete, Edit) N Y Y Y Y Y Y Y Y Y Y
Internet Connectivity(Add, Delete, Edit) N Y Y Y Y Y Y Y Y Y Y
Customer Portal Available VPN Connectivity*1 Y Y Y N N N N N N N N
Virtual Server/vApp (CheckHardware Version/Upgrade Hardware Version)*2 Y Y Y N N N N N N N N
*1 Service order form is needed.
*2 This function will be available in all data centers after September, 2018.

Note

  • For information about Virtual Machines, refer to “3.1 Compute Resource.
  • For information about Customer Portal features and how to use them, refer to the separate volume “Enterprise Cloud User’s Guide.”
  • For information about the NTT Communications Business Portal, refer to the separate volume “Business Portal User’s Guide.”

2.1.3. Each Type of Permissions

You can take an appropriate management of each portal user by combining permissions.
Available Functions
The following four types of permissions are available.
Type of Permission Items to Be Managed
Portal administrator’s permission Each type of setting information about accounts, adding accounts, deleting accounts, etc.
Global portal permission Availability of accepting each type of notice (dashboard information, email), API user management
Ticket permission Permission to view/edit the information in relation to customer portal tickets
Permission to control functions Availability of the control of each type of facility/equipment

Portal Administrator's Permission
The portal administrator’s permission refers to the permission for the management of each type of the setting information in relation to accounts. If you are a portal user with the portal administrator’s permission, you can make the settings of the portal administrator’s permission for each portal user.
Globa Portal Permission
The global portal permission refers to the permission that is set for receiving notice in relation to this service. The setting of the global portal permission can be made for each portal user. In this service, only a part of the global portal permissions is used.

Important

  • When a portal user is created for the first time, the global portal permission is not set.
The following table shows the types of the notices with their summary as well as their availability in this service.
Global Portal Permission Summary
Manage API User Can manage API users
Receive Maintenance Email Receives the notification in relation to maintenance
Receive Outage Email Receives the notification in relation to service troubles
Receive Marketing Email Receives the notification in relation marketing and the update information about documents
Receive Security Email Receives the notification in relation to security
*Some permissions other than the above are displayed at the portal. They are not used in this service.

Ticket Permission
With the ticket permission, you can set the permission to view and the permission to edit the tickets to each Data Center. The portal users that belong to the ticket permission group can make the portal operations in relation to tickets within the scope of the privilege assigned to the ticket permission group. To set up a permission, you need to be a portal user that has a “portal administrator’s permission” in the global ticket permission.

Note

  • If you add a new portal user, periodical batch processing links the information to the ticket system. After you add a portal user to the ticket permission group, if you do not see the user newly added, wait for a while and make the setting.
  • In the ticket group, a group named “Automatic Group – Full Ticketing Permissions” is registered as default. This group is the user group that is assigned with the permissions to control all functions. This group is not allowed to make any operation other than adding or deleting portal users who belong to the group (editing ID names and/or description and deleting user groups).
Permission to Control Function
The permission to control function refers to the permission to control the operation of each of the facility and equipment.
On the Customer Portal, you can assign the permissions to control each function by the unit of every one of the facility and equipment with respect to each user group. For example, you can assign a permission for the control to every virtual server.
The portal users that belong to the user group assigned with a permission to control the functions of each of the facility and equipment can control each of the facility and equipment with the assigned permission.
  • Details of the Permission
You can set up a permission concerning “View”, “Edit (2.0)”, and “Alarm” of each of the facility and equipment.
Classification Description
View The permission to view the setting information about facility and equipment.
Edit (CP2.0) The permission to edit the setting information about facility and equipment (changing and deleting settings).
Add (CP2.0) The permission to add the setting information about facility and equipment.
Alarm The permission to receive the alert mail concerning facility and equipment.

Besides the permission to control the functions concerning each of the existing facility and equipment, you can set up the default permission to control functions that is automatically assigned to each of the new creation of facility and equipment. You can assign the permission to control functions to each user group depending on the requirements of the customer. A portal user needs to have the permission of a portal administrator to make this operation. If a portal user belongs to two or more user groups, the portal user is assigned with all the permissions to control the functions assigned to the group he/she belong to.
It is necessary that a permission to control functions should be implemented in the unit of the Area to which the Data Center belongs.
If you do not have any such contract, you do not need any such permission (they are not shown).
Shown below is some information about Areas.
Area Name of Data Center
Japan Yokohama No.1, Kansai1, Saitama No.1, Hong Kong Tai Po
Europe Hemel Hempstead2, Spain Madrid2, France Paris2
US San Jose Lundy
APAC Singapore Serangoon, Malaysia Cyberjaya3, Thai Bangna

Note

  • In the user group, a group named “Automatic Group – Full Permissions” is registered as default. This group is the user group that is assigned with the permissions to control all functions. This group is not allowed to make any operation other than adding or deleting portal users who belong to the group (editing ID names and/or description and deleting user groups).
  • Included in the Permission
Shown below are the facility and equipment that can be assigned with the permissions to control functions followed by their descriptions.
Classification Description
Service Can add a permission to view/edit information about each service in the contract.
Enterprise Cloud Service
Can add a permission to view/edit/add each type of resource to each data center used in an individual Enterprise Cloud Service.

Applicable items: To add a resource pool, add vApp add a private catalog, add vLoad Balancer, take management of an image backup, take management of a server segment
vFirewall Can add a permission to view/edit information about an individual vFirewall
vLoad Balancer Can add a permission to view/edit information about an individual vLoad Balancer
Integrated Network Appliance (INA) Can add a permission to view/edit information about an individual Integrated Network Appliance
vApp (Virtual Machine) Can add a permission to view/edit information about an individual vApp (Virtual Machine)/to add a template and a permission for an alarm.
Virtual Machine Template Can add a permission to view/edit an individual Virtual Machine template.
Compute Resource Pool Can further add a permission to view/edit an individual Compute Resource Pool.
Private Catalog Can add a permission to view/edit an individual Private Catalog and a permission for vApp templates (ova format).
Colocation Interconnectivity Can add a permission to view/edit information about an individual colocation Interconnectivity gateway.
VPN Connectivity Can add a permission to view/edit information about an individual VPN gateway.
Internet Connectivity Can add a permission to view/edit information about an individual Internet gateway

There are some attentions in the services listed below.
Classification Description
Image Backup
The permission to the whole of the Image Backup (registering a backup job, restoration, deleting a backup image): Included in the Enterprise Cloud Service. For an operation in relation to the backup of a server, however, the Edit (CP2.0) permission of each vApp is necessary.

For receiving a notice in relation to a backup, it is necessary to check Edit (CP2.0) or Alert with vApp.
Server Segment Adding, deleting, and editing a Server Segment are included in the Enterprise Cloud Service. No display is available, and it is not possible to set up individual permissions of each segment.
Global File Storage Included in the service. This is displayed only when a contract is made.
Acronis license
HULFT license
DB license (Oracle SE/EE RAC)
It is not allowed to set up permissions. Customer who have view only permission account can manage the services.
* Available menus vary depending on the country of a contract and a data center. Currently, as no permission function is available, the service is usable with an account of a view permission. Permissions will be added in the future.

Important

  • As the Customer Portal is updated to ver. 2.0, the “edit” permissions of some services are subdivided into Edit (CP2.0) and Add xx (CP2.0). Currently, “edit” works as a strong permission that includes the both. So if you create a new group and set up the permissions, uncheck “edit” and use only those permissions that are marked with “(CP2.0)”.
Information about the indications on the Customer Portal and the description
Indication on the Portal (Area) Applicable Item Item to Set Up Permissions Description
Per Service Permissions (Area) Service in the contract View The view permission in the Cloud, Colocation, Colocation Interconnectivity, and Global File Storage services
Edit The edit permission in the Cloud, Colocation, Colocation Interconnectivity, ad Global File Storage service
Alarm Not used.
Per Enterprise CloudService Permissions (Area) Enterprise Cloud View The view permission at the Enterprise CloudPortal
Edit *1 Not used.
Edit(CP2.0) The edit permission at the Enterprise CloudPortal.
Add Compute Pool (CP2.0) The permission to add Compute Pool
Add vApp(CP2.0) *2 The permission to add vApp(Virtual Machine)
Add Private Catalog(CP2.0) The permission to add Private Catalog
Add vLB(CP2.0) The permission to add vLB
Alarm Not used.
Per Enterprise Cloud vFW Permissions (Area) vFirewall View The permission to view vFirewall
Edit *1 Not used.
Edit(CP2.0) The permission to edit vFirewall
Alarm Not used.
Per Enterprise Cloud vLB Permissions (Area) vLoad Balancer View The permission to view vLoad Balancer
Edit *1 Not used.
Edit (CP2.0) The permission to edit vLoad Balancer
Alarm Not used.
Per Enterprise Cloud vApp Permissions (Area) vApp (Virtual Machine) View The permission to view vApp(Virtual Machine)
Edit *1 Not used.
Edit (CP2.0) The permission to edit vApp(Virtual Machine)
Add vAppTemplate(CP2.0) The permission to create Virtual Machineserver templates of vApp(Virtual Machine)
Alarm The permission to receive alarm notice mail in relation to vApp(Virtual Machine)and its Image Backup
Per Enterprise Cloud VM template Permissions (Area)

Virtual Machine template

(Private Catalog)

View The permission to view Virtual Machinetemplates
Edit *1 Not used.
Edit (CP2.0) The permission to edit Virtual Machinetemplates
Alarm Not used.
Per Enterprise Cloud Compute Pool Permissions (Area) Compute Resource Pool View The permission to view Compute Resource Pool
Edit *1 Not used.
Edit (CP2.0) The permission to edit Compute Resource Pool
Add vApp(CP2.0) *2 The permission to add vApp(Virtual Machine)
Alarm Not used.
Per Enterprise Cloud Private Catalog Permissions (Area) Private Catalog View The permission to view Private Catalog
Edit *1 Not used.
Edit (CP2.0) The permission to edit Private Catalog
Add vAppTemplate(CP2.0) The permission to add Virtual Machinetemplates (OVAfile)
Alarm Not used.
Per Enterprise Cloud vCIC GW Permissions (Area) Colocation Interconnectivity View The permission to view Colocation Interconnectivity
Edit *1 Not used.
Edit (CP2.0) The permission to edit Colocation Interconnectivity
Per Enterprise Cloud vVPN GW Permissions (Area) VPNConnectivity View The permission to view VPNConnectivity
Edit *1 Not used.
Edit (CP2.0) The permission to edit VPNConnectivity
Per Enterprise Cloud INA Permissions (Area) Integrated NetworkAppliance View The permission to view INA
Edit *1 Not used.
Edit (CP2.0) The permission to edit INA
Alarm Not used.
Per Enterprise Cloud vInternet GW Permissions (Area) Internet Connectivity View The permission to view Internet Connectivity
Edit *1 Not used.
Edit (CP2.0) The permission to edit Internet Connectivity
*1 “Edit” is in the enabled status on the system as a permission similar to Edit (CP2.0) + Add (CP2.0). So if you set up the permission, make sure uncheck it.
*2 If you add a permission of vApp (Virtual Machine), it is necessary to set up both Add vApp (CP2.0) items of Enterprise Cloud and Compute Resource Pool.
* Alarms are valid only with vApp.
* Integrated Network Appliance and vFirewall are used in a service included in a contract.
* Some data centers may show “Per Enterprise Cloud vLB2 Permissions”, but this is not used in this service.

2.1.4. Operation log

You can view and download the history of log-in to the Customer Portal, various operations on the Customer Portal and the history related to usage of API.
The following features are available.
Feature Description
Display of the history
The history for a maximum 2 days appears on the Customer Portal. Histories to be displayed are as follows:
  • Operation history related to devices and features
  • History of log-in to the Customer Portal
  • History of changes of account information
  • Change record of authority to use features
Downloading the log file It is possible to download the stored history in the CSV format from the portal to the customer’s environment. Histories for the last 3 months are stored. The character code is Unicode (UTF-8).

Operation record related to equipment and features
It is possible to refer to and download the operation histories related to equipment and features from “Task” in the Operation menu of the Customer Portal.
Equipment and features from which the Operation log can be acquired as follows:
  • Compute resource pool
  • Virtual Server (vpp)
  • Private Catalog
  • Internet connectivity (supporting the Customer Portal)
  • VPN connectivity (supporting the Customer Portal)
  • Server Segment (supporting the Customer Portal)
  • vFirewall
  • vLoad Balancer
  • Integrated network appliance
Items to be displayed in Task are as follows:
Item Description
Summary Operation of equipment and feature
Status Operation status of equipment and feature
Progress Progress of operation
Started Start timer of operation
Owener Executer of operation (login ID)
Ref Control number of operation
Accepted Acceptance status of operation

Contents of the CSV file at the time of downloading are as follows:
Item Description
jobid Control number of operation
owner Executor type of operation
user Login ID
Started Start time of operation
%complete Progress status of operation
status Operation status of equipment and feature
title Contents of operation of equipment and feature
description Description
finished Completion time

History of log-in to the Customer Portal
It is possible to refer to and download the Login history from “User management” in the Customer Portal. You must have the account with the portal administrative right. The history of login failure related to entry of wrong login ID is not acquired.
Contents of the Login history to be displayed in the Customer Portal are as follows:
Item Description
Timestamp Date and time of authentication
Implementer Type of login user
Source IP address of the executor of operation
User Login user name
Event Contents of event related to authentication
Remote IP Source IP address at the time of login

Contents of the CSV file at the time of downloading are as follows:
Item Description
Recorded At Date and time of authentication
Actor Type of login user
Actor UUID ID for identifying login user
Source IP address of the executor of the operation
User Login user name
User UUID ID for identifying login user
Event Description of events related to authentication
Remote IP Source IP address used at login
Primary Mechanism (Primary authentication mechanism (Password or One Time Password)
Secondary Mechanism Secondary authentication mechanism (Not used)
User Agent Source browser information

Details of contents of events related to authentication are as follows:
Event Operation
Authentication success Login to CP
Login complete Login to CP
Login authenticated Login to CP
Authentication attempt failed: bad credentials Wrong Password
Authentication attempt failed: deleted Try to login to CP by deleted user
Credentials reset Add User and set password
Credentials issued Add User and set password
Credentials reset Reset password
Authentication attempt failed: failed to provide credentials Password non-input
Logout by session deletion Logout by button of logout
Logout explicit Logout by button of logout
Logout by deletion of all of this user sessions Portal Admin carry out the suspend of the user
Logout by associated sessions deletion Session time-out
Logout by session deletion Session time-out
Logout explicit Session time-out
Credentials changed Change Password
Authentication attempt failed: suspended Try to login to CP by suspended user
Credentials reset Reset password
Read-only login Login to CP by OP

History of changes of account information
It is possible to refer to and download the history of changes of account information from “User management” in the Customer Portal.
The person having the account with the portal administrative right can refer to and download the history of all users. The person does not have the administrative right can refer to and download only the own history.
Display pf history of changes of account in the Customer Portal are as follows:
Item Description
Recorded At Date and time of change
Actor Type of login user
Source IP address of the executor of operation
Action Addition or deletion of user
Who Name of user who made the change
Fields List of fields to be changed

Contents of CSV file at downloading are as follows:
Item Description
Recorded At Date and time of change
Actor Type of login user
Actor UUID ID for identifying login user
Source IP address or host name of the executor of operation
Action Addition or deletion of user
Customer (Not used)
Customer UUID ID for identifying Customer (Not used)
User Login user name
User UUID ID for identifying login user
Fields List of fields to be changed
Before State Field information before making a change
After State Field information after making a change

Contents of fields are as follows
Field Description
comments comment
customer_id customer ID
email email address
is_deleted state of deleting user
job_title job title
language (tag) language
location location
login login ID
manually_unsuspended_at Time of unsuspension of user with operation
mcop_id setting of Biziness Portal user ID
mobile_number mobile number
name name
password_changed_at time of password changed
password_has_changed Existence/nonexistence of change of password
password_is_set password setting
permitted_networks_only_exempt setting of permitted network
phone_number phone number
portal_access setting of portal access
portal_admin setting of portal admin
state_tag state of user
suspended_until time of unsuspended
terms_agreed_at time of T&C agreed
terms_agreed_version Agreed version of T&C
tfa_required (not available) setting of TFA (Two factor authentication)
tfa_secret_key_is_set setting of TFA secret key (not available)
tfa_secret_key_validated validating of TFA secret key (not available)
timezone_name setting of timezone
uuid user UUID
Permitted_networks add / edit /delete Permitted networks
cc_authn_policy setting of permitted networks only (Changes in the authentication policy (Session of locking IP address)
permitted_networks_only setting of permitted networks only (Changes in the authentication policy “Login from the permitted network only)

History of changes of administrative right for operating feature
It is possible to refer to and download the history of changes of operating feature from “Management of administrative right” in the Customer Portal. It is possible to refer to and download the history for each administrative right group or all administrative right groups all at once.
Contents to be displayed in the history of changes of the operating feature in the Customer Portal are as follows.
Item Description
Who User name
When Date and time of change
Event Contents of event
Type Event type
Name Name of operation function administration group

Contents of the CSV file at downloading are as follows.
Item Description
Who User name
When Date and time of change
Event Contents of event
Type Event type

2.1.5. Important Points

  • The Customer Portal is accessed through a web browser using the Internet. Please prepare an environment in which you have Internet access.

  • Use the following web browser to access the Customer Portal.
    Mozilla Firefox 45 or higher 32bit
    * To use a console connection, you need “Mozilla Firefox from 45.0 to 51.0” or “Mozilla Firefox 45.0 for ESR” or “Internet Explorer11” on Windows. And VMware Plug-in installation is not necessary when you use Console Connectivity (HTML version). And note that ISO Image Mount Feature is not available in Console Connectivity (HTML version).
  • If Firefox version is 30 or higher, please change VMware Remote Console Plug-in setting to be always activated.

  • Time zone of date and time displayed on the history are as follows:

History type Time zone
Operation history regarding equipment and feature
History of changes in administrative right of operating feature
Time zone set for the user account
History of login to the Customer Portal
History of change of account information
UTC

  • Session times out if no operation is made on the Portal for 15 minutes.

Important

  • NTT Communications is not responsible for unauthorized use of the Customer Portal resulting from the loss or leaking of password information issued to the customer.
  • When using one Customer Portal to batch manage multiple Data Centers, please notify NTT Communications beforehand. You cannot consolidate Data Centers back into one Data Center after you start using them in separate Customer Portals.

Note

  • When using a console connection, enable the Java Script features in your web browser.
  • You cannot manage one Data Center from multiple Customer Portals.