NetBackup™ Web UI Administrator's Guide
- Introducing NetBackup
- Section I. Monitoring and notifications
- Monitoring NetBackup activity
- Activity monitor
- Job monitoring
- Notifications
- Monitoring NetBackup activity
- Section II. Configuring hosts
- Managing host properties
- Managing credentials for workloads and systems that NetBackup accesses
- Managing deployment
- Section III. Configuring storage
- Section IV. Configuring backups
- Section V. Managing security
- Security events and audit logs
- Managing security certificates
- Managing host mappings
- Managing user sessions
- Managing the security settings for the primary server
- About trusted primary servers
- Using access keys, API keys, and access codes
- Configuring authentication options
- Managing role-based access control
- Configuring RBAC
- Add a custom RBAC role
- Section VI. Detection and reporting
- Detecting malware
- Detecting anomalies
- Usage reporting and capacity licensing
- Detecting malware
- Section VII. NetBackup workloads and NetBackup Flex Scale
- Section VIII. Disaster recovery and troubleshooting
Add a custom RBAC role to restore Azure-managed instances
To restore Azure-managed instances, users must have the view permission for these instances. Administrators and similar users can provide other users with a custom role and this permission.
To assign the view permission for Azure-managed instances
- To get the access control ID of the managed instance, enter the following command:
GET /asset-service/workloads/cloud/assets?filter=extendedAttributes/ managedInstanceName eq 'managedInstanceName'
Search for accessControlId field in the response. Note down the value of this field.
- To get the role ID, enter the following command:
GET /access-control/roles
Search for the id field in the response. Note down the value of this field.
- Create an access definition, as follows:
POST /access-control/managed-objects/{objectId}/access-definitions
Request payload
{ "data": { "type": "accessDefinition", "attributes": { "propagation": "OBJECT_AND_CHILDREN" }, "relationships": { "role": { "data": { "id": "<roleId>", "type": "accessControlRole" } }, "operations": { "data": [ { "id": "|OPERATIONS|VIEW|", "type": "accessControlOperation" } ] }, "managedObject": { "data": { "id": "<objectId>", "type": "managedObject" } } } } }
Use the following values:
objectId: Use the value of accessControlId obtained from step 1.
roleId: Use the value of id obtained from step 2.
Note:
For an alternate restore, provide the |OPERATIONS|ASSETS|CLOUD|RESTORE_DESTINATION| permission in the operations list.