APTARE IT Analytics System Administrator Guide
- Preparing for updates
- Backing up and restoring data
- Monitoring APTARE IT Analytics
- Accessing APTARE reports with the REST API
- Defining NetBackup estimated tape capacity
- Automating host group management
- Categorize host operating systems by platform and version
- Bulk load utilities
- Automating NetBackup utilities
- Attribute management
- Importing generic backup data
- Backup job overrides
- Managing host data collection
- System configuration in the portal
- Host discovery: EMC Avamar
- Performance profile schedule customization
- Configuring AD/LDAP
- Configuring single sign-on (SSO) using security assertion markup language (SAML)
- Changing Oracle database user passwords
- Integrating with CyberArk
- Tuning APTARE IT Analytics
- Working with log files
- Portal and data collector log files - reduce logging
- Data collector log file naming conventions
- Portal log files
- Defining report metrics
- SNMP trap alerting
- SSL certificate configuration
- Configure virtual hosts for portal and / or data collection SSL
- Keystore on the portal server
- Portal properties: Format and portal customizations
- Advanced configuration for NetBackup discovery
- Data retention periods for SDK database objects
- Configure multi-tenancy data purging retention periods
- Troubleshooting
Activating single Sign-on (SSO) in the portal
Setup SSO properties by navigating to Admin>Advanced>System Configuration>Portal. Access to System Configuration settings are restricted to users with a Super User role. In addition to the SSO properties displayed in the System Configuration, a valid SSL certificate must added to the portal keystore. Field descriptions for each of the properties are available through rollover text.
You must have downloaded the SAML metadata XML file from the external Identity Provider (IDP).
To activate single sign on in the Portal
- Navigate to Admin>Advanced>System Configuration>Portal.
- In the section SSO using SAML, enable SSO.
- Enable SSO authorization if required. Selecting this option activates group memberships from the external LDAP.
Note:
The group name derived from the memberOf list must match the name of the User Group.
- Enter the URL for the portal application. This should be an https URL with a trailing '/' at the end of URL.
- Browse to the metadata.xml file that was downloaded from the external Identity Provider (IDP).
- Enter the URL for the external IDP server. The entityId must match the value of entityId as listed in the IDP metadata XML file.
- Enter the domain to be assigned to the SSO user when the Portal creates it automatically.
- Restart the Portal Tomcat service.
Note:
If there are issues with the configuration, your Portal may not restart. There is a utility (resetSSoConfig) available to reset the parameters so the Portal can be restarted.
- Download the metadata XML file using the following URL:
https://aptareportal.domain_name/saml/metadata
Note:
If the XML is displayed in the browser, you can select "save target as" to save the XML as a file.
This file will be required on the external Identity Provider (IDP) server to identify APTARE IT Analytics as a service provider for SSO and complete the registration process.
Note:
The XML file is only available once the configuration settings have been saved and the Portal Tomcat service has been restarted.
- After the registration process is complete, open the Portal login screen and try to login with Single Sign On.
Note:
If there are issues with the configuration, your Portal may not restart. There is a utility (resetSSoConfig) available to reset the parameters so the Portal can be restarted.
- Navigate to Admin>Advanced>System Configuration>Portal.