Veritas CloudPoint Administrator's Guide
- Getting started with CloudPoint
- Section I. Installing and configuring CloudPoint
- Preparing for installation
- Deploying CloudPoint
- Deploying CloudPoint in the AWS cloud
- Using plug-ins to discover assets
- Configuring off-host plug-ins
- AWS plug-in configuration notes
- Google Cloud Platform plug-in configuration notes
- Microsoft Azure plug-in configuration notes
- HPE RMC plug-in configuration notes
- NetApp plug-in configuration notes
- Hitachi plug-in configuration notes
- InfiniBox plug-in configuration notes
- About CloudPoint plug-ins and assets discovery
- Configuring the on-host agents and plug-ins
- Oracle plug-in configuration notes
- Protecting assets with CloudPoint's agentless feature
- Preparing for installation
- Section II. Configuring users
- Section III. Protecting and managing data
- User interface basics
- Indexing and classifying your assets
- Protecting your assets with policies
- Tag-based asset protection
- Replicating snapshots for added protection
- Managing your assets
- About snapshot restore
- Single file restore requirements and limitations
- Additional steps required after a SQL Server snapshot restore
- Monitoring activities with notifications and the job log
- Protection and disaster recovery
- Section IV. Maintaining CloudPoint
- CloudPoint logging
- Troubleshooting CloudPoint
- Working with your CloudPoint license
- Managing CloudPoint agents and plug-ins
- Upgrading CloudPoint
- Uninstalling CloudPoint
- Section V. Reference
Configuring AWS permissions for CloudPoint
To protect your Amazon Web Services (AWS) assets, CloudPoint must first have access to them. You must associate a permission policy with each CloudPoint user who wants to work with AWS assets.
Ensure that the user account or role is assigned the minimum permissions required for CloudPoint.
See AWS permissions required by CloudPoint.
To configure permissions on Amazon Web Services
- Create or edit an AWS user account from Identity and Access Management (IAM).
- Do one of the following.
To create a new AWS user account, do the following:
From IAM, select the Users pane and click Add user.
In the User name field, enter a name for the new user.
Select the Access type. This value determines how AWS accesses the permission policy. (This example uses Programmatic access).
Select Next: Permissions.
On the Set permissions for username screen, select Attach existing policies directly.
Select the previously created permission policy (shown below) and select Next: Review.
On the Permissions summary page, select Create user.
Obtain the Access Key and Secret Key for the newly created user.
To edit an AWS user account, do the following:
Select Add permissions.
On the Grant permissions screen, select Attach existing policies directly.
Select the previously created permission policy (shown below), and select Next: Review.
On the Permissions summary screen, select Add permissions.
- To configure the AWS plug-in for the created or edited user, refer to the plug-in configuration notes.
More Information