Veritas Alta™ SaaS Protection Administrator's Guide
- Introduction to Veritas Alta™ SaaS Protection
- EDB and EDB compliance
- Active Directory synchronization
- Manage users and roles
- API permissions
- Add connectors
- Overview of adding connectors
- Add Exchange Online connectors
- Configure the capture scope for Exchange connectors
- Configure the capture scope for Exchange connectors
- Add SharePoint Online connectors
- Configuring the capture scopes for SharePoint connectors
- Add Teams site collections connectors
- Add OneDrive connectors
- Add Teams chat connectors
- Add Audit Log connectors
- Add Google Drive connectors
- Add Gmail connectors
- About the Salesforce connector
- Add Entra ID (Azure AD) connectors
- Add Box connectors
- Add Email/Messages
- Apps Consent Grant Utility
- Add Retention policies
- Perform backups
- Manage backed-up data
- Perform restores using Administration portal
- Restore SharePoint/OneDrive/Teams Sites and data
- Restore Teams chat messages and Teams channel conversations
- Restore Box data
- Restore Google Drive data
- About the Salesforce Data, Metadata, and CRM Content restore
- Limitations of Salesforce Metadata backup and restore
- About Entra ID (Azure AD) objects and records restore
- Perform restores using Export Utility
- Restore dashboard
- Install services and utilities
- Discovery
- Add Tagging polices
- Add Tiering policy
- General administrative tasks
- Manage Stors (Storages)
- Managing Scopes
- Known Issues
Role-based access control
Role-based access control (RBAC) in the Veritas Alta SaaS Protection environment enables you to manage resource access by assigning roles to individual users. Resources include backed-up content, connectors, policies, and more in this context. The roles define users' access to these resources, with permissions governed by the assigned roles. RBAC allows for the customization of roles to meet specific business needs. Roles can be modified or deleted as requirements change, ensuring that only authorized users can access them. Users within the same group inherit the assigned role, enabling them to perform the same operations on the resource.
After Active Directory (AD) synchronization with your environment, all users and groups become recognized by Veritas Alta SaaS Protection. These users are displayed on the
page in the Veritas Alta SaaS Protection Administration portal. The users synchronized from the customer's AD are classified as , while those added directly through Veritas Alta SaaS Protection and outside the customer's domains and the users who are deleted from your AD are referred to as . Both the internal and external users are assigned the system role, which provides access to the End-User portal. This Default role grants permissions to search, share, and perform self-restores for content they have access to.