NetBackup™ Web UI Administrator's Guide
- Introducing NetBackup
- Section I. Monitoring and notifications
- Monitoring NetBackup activity
- Activity monitor
- Job monitoring
- Notifications
- Monitoring NetBackup activity
- Section II. Configuring hosts
- Managing host properties
- Managing credentials for workloads and systems that NetBackup accesses
- Managing deployment
- Section III. Configuring storage
- Section IV. Configuring backups
- Section V. Managing security
- Security events and audit logs
- Managing security certificates
- Managing host mappings
- Managing user sessions
- Managing the security settings for the primary server
- About trusted primary servers
- Using access keys, API keys, and access codes
- Configuring authentication options
- Managing role-based access control
- Configuring RBAC
- Add a custom RBAC role
- Section VI. Detection and reporting
- Detecting malware
- Detecting anomalies
- Usage reporting and capacity licensing
- Detecting malware
- Section VII. NetBackup workloads and NetBackup Flex Scale
- Section VIII. Disaster recovery and troubleshooting
User identity in the audit report
The audit report indicates the identity of the user who performed a specific action. The full identity of the user includes the user name and the domain or the host name that is associated with the authenticated user. A user's identity appears in the audit report as follows:
Audit events always include the full user identity. Root users and administrators are logged as "root@hostname" or "administrator@hostname".
In NetBackup 8.1.2 and later, image browse and image restore events always include the user ID in the audit event. NetBackup 8.1.1 and earlier log these events as "root@hostname" or "administrator@hostname".
The order of the elements for the user principal is "
domain:username:domainType:providerId
". The domain value does not apply for Linux computers. For that platform, the user principal is:username:domainType:providerId
.For any operations that do not require credentials or require the user to sign in, operations are logged without a user identity.