Please enter search query.
Search <book_title>...
Veritas Alta™ SaaS Protection Administrator's Guide
Last Published:
2024-09-18
Product(s):
Veritas Alta SaaS Protection (1.0)
- Introduction to Veritas Alta™ SaaS Protection
- Active Directory synchronization
- Manage users and roles
- API permissions
- Add connectors
- Overview of adding connectors
- Add Exchange Online connectors
- Configure the capture scope for Exchange connectors
- Configure the capture scope for Exchange connectors
- Add SharePoint Online connectors
- Configuring the capture scopes for SharePoint connectors
- Add Teams site collections connectors
- Add OneDrive connectors
- Add Teams chat connectors
- Add Audit Log connectors
- Add Google Drive connectors
- Add Gmail connectors
- About the Salesforce connector
- Add Entra ID (Azure AD) connectors
- Add Box connectors
- Add Email/Messages
- Apps Consent Grant Utility
- Add Retention policies
- Perform backups
- Manage backed-up data
- Perform restores using Administration portal
- Restore SharePoint/OneDrive/Teams Sites and data
- Restore Teams chat messages and Teams channel conversations
- Restore Box data
- Restore Google Drive data
- About the Salesforce Data, Metadata, and CRM Content restore
- Limitations of Salesforce Metadata backup and restore
- About Entra ID (Azure AD) objects and records restore
- Perform restores using Export Utility
- Restore dashboard
- Discovery
- Add Tagging polices
- Add Tiering policy
- General administrative tasks
- Manage Stors (Storages)
- Managing Scopes
- Known Issues
How to enable Active Directory (Entra ID) synchronization
In order for Veritas Alta SaaS Protection to synchronize with your Microsoft Entra directory, an Azure Global Admin must approve the app with ID 25fb04f2-f2ac-405b-ac01-c39ad4ee6a26.
You will receive the consent URL in the welcome email the following format:
https://login.microsoftonline.com/contoso.onmicrosoft.com/adminconsent?client_id=25fb04f2-f2ac-405b-ac01-c39ad4ee6a26
You need to replace contoso.onmicrosoft.com in the above URL with your primary domain. Your primary domain is listed on the Microsoft Entra overview page of the Azure portal.
The app requests the following permissions:
Directory.read.all: This permission is required to read directory data.
User.read: This permission is required to sign in and read the user profile.