Veritas Velocity™ User's Guide
- Getting to know Velocity
- Setting up Velocity
- How to set up the Velocity Storage Server
- How to set up the Velocity Client
- Setting up the Velocity on-premises management server
- Upgrading Velocity
- Velocity Storage Server
- Users and roles
- Oracle database ingestion using Velocity
- How to use copy preparation to mask or sanitize sensitive data
- Oracle database ingestion using NetBackup CoPilot
- Microsoft SQL Server database ingestion using Velocity
- Automatic ingestion of NetBackup deduplicated backups
- Database sources and copies
- About scheduling ingestions for a database source
- Retention periods for database sources and copies
- Sandboxes
- Database recovery
- Alerts and logs
- Managing the Velocity physical appliance
- Configuring network address settings on the Velocity physical appliance
- About WAN optimization on the Velocity physical appliance
- About the Veritas Remote Management Console on the Velocity physical appliance
- About Velocity physical appliance storage
- About users on the Velocity physical appliance
- About Velocity physical appliance checkpoints
- About factory reset on the Velocity physical appliance
- Configuring network address settings on the Velocity physical appliance
- Monitoring the Velocity physical appliance
- Velocity physical appliance security
- About Velocity physical appliance user account privileges
- About the Velocity physical appliance intrusion detection system
- About Velocity physical appliance operating system security
- Recommended IPMI settings on the Velocity physical appliance
- Velocity REST APIs
- Best practices
- Troubleshooting
- Glossary
- Section I. Velocity shell menu commands
- Introduction
- Appendix A. Main > Manage > Storage
- Appendix B. Main > Manage > Cloud
- Appendix C. Main > Manage > Software
- Appendix D. Main > Monitor
- Appendix E. Main > Network
- Appendix F. Main > Settings
- Appendix G. Main > Support
Authenticate a user for the Velocity REST APIs
Velocity uses a two-part authentication process. You must first access apps.veritas.com and be authenticated as a user. You can then use the token that is returned for API requests.
Description: Provides access to apps.veritas.com
Method: POST
URL: https://apps.veritas.com/login
Request body:
{ "username": "username@company.com", "organization": "organization", "password": "password" }
The call returns an "accessToken" : "<access token>".
Use the returned access token from Access apps.veritas.com for API requests.
Description: Provides access to Velocity.
Method: POST
URL: https://velocity.apps.veritas.com/security/authentication?isJanusAuthentication=true
Header: x-janus-token: <access token>
The call returns two values that are required in all future API requests:
tokenType: "<token type>"
For example: tokenType: "Bearer",
an "authToken" : "<authorization token>"
For example: authToken: "abcd...wxyz",
You must use the following format for these values:
Authorization: <tokenType> <authToken>
For example: Authorization: Bearer abcd...wxyz
Ensure that you also include all of the following headers in the API requests:
Accept-Language:en-US Authorization: <authorization token> Accept:application/json Content-Type:application/json