Veritas CloudPoint Administrator's Guide
- Getting started with CloudPoint
- Section I. Installing and configuring CloudPoint
- Preparing for installation
- Deploying CloudPoint
- Deploying CloudPoint in the AWS cloud
- Using plug-ins to discover assets
- Configuring off-host plug-ins
- AWS plug-in configuration notes
- Google Cloud Platform plug-in configuration notes
- Microsoft Azure plug-in configuration notes
- HPE RMC plug-in configuration notes
- NetApp plug-in configuration notes
- Hitachi plug-in configuration notes
- InfiniBox plug-in configuration notes
- About CloudPoint plug-ins and assets discovery
- Configuring the on-host agents and plug-ins
- Oracle plug-in configuration notes
- Protecting assets with CloudPoint's agentless feature
- Preparing for installation
- Section II. Configuring users
- Section III. Protecting and managing data
- User interface basics
- Indexing and classifying your assets
- Protecting your assets with policies
- Tag-based asset protection
- Replicating snapshots for added protection
- Managing your assets
- About snapshot restore
- Single file restore requirements and limitations
- Additional steps required after a SQL Server snapshot restore
- Monitoring activities with notifications and the job log
- Protection and disaster recovery
- Section IV. Maintaining CloudPoint
- CloudPoint logging
- Troubleshooting CloudPoint
- Working with your CloudPoint license
- Managing CloudPoint agents and plug-ins
- Upgrading CloudPoint
- Uninstalling CloudPoint
- Section V. Reference
About CloudPoint support for AWS IAM roles
After you deploy CloudPoint, you use the AWS Identity and Access Management (IAM) user credentials (Secret Key and Access Key pair) and configure the CloudPoint plug-in for AWS to discover the AWS assets that you wish to protect using CloudPoint. The key pair is used to get access to the AWS resources and then perform operations on the discovered assets. The AWS account credentials are permanently stored in the CloudPoint configuration database in an encrypted format. CloudPoint uses the key pair authentication mechanism for all deployments, be it on-premise or in the cloud.
Starting with release 2.2, CloudPoint provides support for using AWS IAM roles for CloudPoint deployments in the AWS cloud. IAM is an AWS service that allows you to manage access to AWS services and resources in a secure manner. You can create an IAM role, assign it with the permissions that CloudPoint requires, and then attach the role to the CloudPoint instance. CloudPoint then uses the security credentials provided by the IAM role to discover and perform snapshot operations on the assets in the cloud. You can now use IAM user or IAM roles to configure CloudPoint to protect assets that belong to multiple AWS accounts in the cloud.
Refer to the AWS documentation for more information on IAM roles:
https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html