NetBackup™ Web UI Administrator's Guide
- Introducing NetBackup
- Section I. Monitoring and notifications
- Monitoring NetBackup activity
- Activity monitor
- Job monitoring
- Notifications
- Monitoring NetBackup activity
- Section II. Configuring hosts
- Managing host properties
- Managing credentials for workloads and systems that NetBackup accesses
- Managing deployment
- Section III. Configuring storage
- Section IV. Configuring backups
- Section V. Managing security
- Security events and audit logs
- Managing security certificates
- Managing host mappings
- Managing user sessions
- Managing the security settings for the primary server
- About trusted primary servers
- Using access keys, API keys, and access codes
- Configuring authentication options
- Managing role-based access control
- Configuring RBAC
- Add a custom RBAC role
- Section VI. Detection and reporting
- Detecting malware
- Detecting anomalies
- Usage reporting and capacity licensing
- Detecting malware
- Section VII. NetBackup workloads and NetBackup Flex Scale
- Section VIII. Disaster recovery and troubleshooting
Configuring RBAC
To configure role-based access control for the NetBackup web UI, perform the following steps.
Table: Steps to configure role-based access control
Step | Action | Description |
---|---|---|
1 | Configure any Active Directory or LDAP domains. | Before you can add domain users, Active Directory or LDAP domains must be authenticated with NetBackup. |
2 | Determine the permissions that your users need. | Determine the permissions that your users need to perform their daily tasks. You can use the default RBAC roles or use a default role as a template to create a new role. Or, you can create a completely custom role to fit your needs. See Role permissions. See Default RBAC roles. |
3 | Add users to the appropriate roles. | See Add a user to a role (non-SAML). See Add a user to a role (SAML). See Add a smart card user to a role (non-SAML, without AD/LDAP). |
4 | Determine the permissions that you want for OS administrators | See Disable web UI access for operating system (OS) administrators. See Disable command-line (CLI) access for operating system (OS) administrators. |