Veritas Alta™ View Compliance and Governance User Guide
- Getting started
- About Veritas Alta View Compliance and Governance Management Console
- Prerequisites for using Veritas Alta View Compliance and Governance Management Console
- Veritas Alta View Compliance and Governance Management Console web browser support
- What's new in this release
- Signing in to Veritas Alta View Compliance and Governance Management Console
- Signing out from Veritas Alta View Compliance and Governance Management Console
- Resetting a forgotten password
- Changing your profile password
- Archive Overview
- Working with Dashboard
- Managing Configurations
- About the Configuration page
- Viewing provisioned services
- Selecting the User Management options
- About Provisioning
- CloudLink Sync Summary
- About Managed Tags
- About Account Management
- Searching for archive accounts
- Using search filters
- Creating an archive account
- Viewing and editing the archive account details
- About the Account Details page
- Editing an archive account
- Deleting an archive account
- Deploying users
- Enabling services for existing archive accounts
- Removing user access
- Disabling bulk user accounts
- Editing Mobile Web Access permission for existing archive accounts
- Unlocking an archive account
- Exporting archive account information
- Editing contact details of a system administrator
- Managing Archive Collectors
- About Archive Collectors
- Adding new archive collectors
- Updating configuration of existing archive collectors
- Stopping the import job of archive collectors
- Restarting import job of archive collectors
- Viewing the latest status of Archive Collectors
- Deleting an existing archive collector
- About Exchange Online Archiving
- Setting up modern authentication in Azure AD for Exchange Online sync
- Configuring Exchange Online sync
- About Exchange Online folder synchronization
- Prerequisite for migrating Exchange Online Users configured with Folder Sync to Exchange Online Folder Synchronization
- Configuring Exchange Online folder synchronization
- About Bloomberg Archiving
- About Microsoft Teams Archiving
- About OneDrive for Business Archiving
- About Data Uploading
- About Alta Capture Services Archiving
- Managing Roles and Permissions
- Managing Policies
- Managing Authentication
- Configuring the Veritas Alta Archiving authentication service
- Enabling the Authentication Settings permission for the Policy Manager role
- Assigning the Policy Manager role to an administrator
- Selecting an authentication method
- Uploading a token-signing certificate
- Validating the Identity Provider URL
- Activating single sign-on
- Managing Retention Policies
- About Retention Management
- Configuring the default retention period
- Creating a retention policy
- Editing a retention policy
- Deleting a retention policy
- Associating a retention policy with a policy target
- Disassociating a retention policy from a policy target
- Enabling and disabling the storage expiry setting
- Viewing the storage expiry status table
- Managing Email Continuity Services
- About Email Continuity
- Email Continuity prerequisites
- Configuring Email Continuity
- Provisioning the Email Continuity service for your mail servers
- Adding the Email Continuity IP ranges to your firewall and mail server allowlists
- Updating your email security provider routing configuration
- Testing the Email Continuity configuration
- Managing Email Continuity
- Email Continuity FAQ
- Managing Reports and Notifications
- Classification
- Managing Data Import
- AD FS Configuration Guide
- Alta Personal Archive Deployment for IBM Notes
- Archive Administration Updates in Previous Releases
Setting up modern authentication in Azure AD for Exchange Online sync
If you want to use modern authentication for O365 sync, you need to configure an app in Azure AD. After you complete this setup, you get the Application (Client) ID and the primary domain details. These details are required to manage Exchange Online synchronization.
To set up modern authentication in Azure AD for Exchange Online sync
- Create a new Azure AD app.
To create app on the Azure Active Directory, you need to select App Registrations in the left navigation pane. Click New Registration, and provide the user-facing display name of the application. Click Register.
Copy and note the Application (Client) ID.
- On the Azure AD portal, select Certificates & secrets, and upload the public key for a self-signed certificate created by you for the Azure AD app.
Note:
You can use any secured method to create a self-signed certificate and a public key. However, in this sample scenario, to create a self-signed certificate and a public key, the Create-SelfSignedCertificate.ps1 script is executed. This script is available with the Exchange Online V2 module. Save or install the module from https://www.powershellgallery.com/packages/ExchangeOnlineManagement/2.0.3
Example to create a self signed certificate using Create-SelfSignedCertificate.ps1
< Location where ExchangeOnlineManagement is installed or saved >\ExchangeOnlineManagement\2.0.3\Create-SelfSignedCertificate.ps1
-CommonName AnimDemoCert -StartDate (Get-Date).Date -EndDate (Get-Date).Date.AddYears(1)
After successful execution of this script, a self-signed certificate (.CER) and the public key (.PFX) will be created in the current working directory. You can use the .PFX certificate file in Veritas Alta Archiving, and corresponding .CER certificate file in Azure Active Directory.
Note the password used for the certificate. You need this password later while configuring the Exchange Online sync in Archive Administrator.
In the above example, the self-signed certificate is valid for a year. You can choose the certificate expiry as required.
- Upload the certificate (.CER file) that you have created in the previous step.
Select Certificates & secrets in the left navigation pane. Upload the certificate (.CER file) that you have created in the previous step.
Note:
Certificates are the recommended way to connect to a registered Azure AD app and also Exchange Online V2 module only supports using certificates to connect to Exchange Online using a registered Azure AD app.
- Provide the required API permissions to the app.
The following Azure AD app permissions are required for configuring Exchange Online sync with Modern Authentication:
Note:
The following permissions are required to support for full functionality of this feature. Items noted below as optional can be omitted if the API permission use and the associated functionality is not required for your environment.
Exchange web service (EWS API\Proxy)
(Optional)
API permission use: Web folder deployment
Note:
This permission is required for the initial configuration, but is optional for ongoing use if this functionality is not required. You can remove it after initial configuration.
How to configure: Exchange Online Exchange Online > Application permissions > Other permissions > full_access_as_app
Exchange Online V2 (PowerShell)
(Required)
API permission use: To get exchange related information like delegated permissions, DL membership, and DDL membership.
API permission path: Exchange Online Exchange Online > Application permissions > Exchange > Exchange.ManageAsApp
Note:
Exchange.ManageAsApp permission is required. For reference, see Set up app-only authentication
Role: One of the following roles is required.
Need to assign RBAC roles to the app. You can assign any of the following roles:
Exchange Administrator: Use this role if you want the Exchange Online Sync connector create and manage journal address and journal rules in Exchange automatically for you.
How to configure: AAD->Roles and Administrators->Exchange Administrator->Add Assignments->Search for the app-> Select app-> Add Exchange Administrator
Global Reader: Use this role if you prefer to create and manage journal address and journal rules in Exchange manually.
How to configure: AAD->Roles and Administrators->Global Reader->Add Assignments->Search for the app-> Select app-> Add Global Reader.
Note:
You cannot see the App immediately after creating it. This could take 12-24 or more hours for the app to show up in the list to be selected.
Need to assign the Exchange Administrator role to add journal address in provisioning configuration automatically in exchange.
Else, the Global Reader role serves the same purpose for syncs.
Graph API
API permission use: To get user license and other information from Azure AD.
How to configure:
MS Graph > Application permissions > User > User.Read.All
MS Graph > Application permissions > Directory > Directory.Read.All
Permissions to be assigned: You need to at least assign the User.Read.All permission to the application.
Reference: See Permissions
- To add the journal address automatically to Exchange, add app as an Exchange Administrator.
Alternatively, if you want to add the journal address manually, assigning the Global Reader role is enough.
- From the Azure AD portal, select Custom domain names to view domain names for the Tenant.
Copy and note a domain Name that is Available and contains .onmicrosoft.com which is required to use as the Tenant Name for full functionality in the configuration of Exchange Online sync in Veritas Alta Archiving.
Example: evcloud.onmicrosoft.com