Veritas NetBackup™ Flex Scale Administrator's Guide
- Product overview
- Viewing information about the NetBackup Flex Scale cluster environment
- NetBackup Flex Scale infrastructure management
- User management
- About Universal Shares
- Node and disk management
- Adding a node to the cluster using the NetBackup Flex Scale web interface
- License management
- Managing hardware vendor packages
- User management
- NetBackup Flex Scale network management
- Bonding operations
- Data network configurations
- Network configuration on plain device (eth5)
- Network configuration on bonded interfaces (bond0 on eth5 and eth7)
- NetBackup Flex Scale infrastructure monitoring
- Resiliency in NetBackup Flex Scale
- EMS server configuration
- Site-based disaster recovery in NetBackup Flex Scale
- Performing disaster recovery using RESTful APIs
- NetBackup Flex Scale security
- STIG overview for NetBackup Flex Scale
- FIPS overview for NetBackup Flex Scale
- Support for immutability in NetBackup Flex Scale
- Deploying external certificates on NetBackup Flex Scale
- Troubleshooting
- Collecting logs for cluster nodes
- Troubleshooting NetBackup Flex Scale issues
- Appendix A. Maintenance procedures for HPE servers
- Appendix B. Configuring NetBackup optimized duplication
- Appendix C. Disaster recovery terminologies
- Appendix D. Configuring Auto Image Replication
Directory services and certificate management
The LDAP communication between NetBackup Flex Scale and AD/LDAP server is not secure by default. You can secure this traffic by using SSL/TLS.
When an AD/LDAP domain is configured using an SSL connection, you must provide the SSL certificate while adding the domain. The server's name used while adding the domain must exactly match with the server CN used for generating the certificate. If you used an FQDN to generate the certificate in a non-DNS environment, then you have to add the IP to FQDN mapping using the Considerations for configuring AD/LDAP.
option in the Appliance UI. SeeNote:
If AD/LDAP is configured with SSL=on, only FIPS-compliant encryption is supported for a deployment with only media servers.
To configure AD/LDAP
- Navigate to Settings > Directory Services and click Configure.
- Enter the inputs required.
LDAP server address
IP address or FQDN of the AD/LDAP server
Port
Port number on which the AD/LDAP server is listening.
If AD/LDAP is configured without SSL certificate, then port number should be 389.
If AD/LDAP is configured with SSL certificate, then port number should be 636.
Directory type
Specify the directory type. It can be Open LDAP or Active Directory (when using Microsoft Active Directory)
Domain name
Specify the domain name.
User Base DN
Base DN subtree that is used when searching for user entries on the AD/LDAP server.
Group Base DN
Base DN subtree that is used when searching for group entries on the AD/LDAP server.
Bind DN/LDAP administrator
Distinguished name of theAD/ LDAP user who can search the AD/LDAP directory. Typically, it is the user name of the AD/LDAP server administrator.
Bind DN/LDAP password
Password for the given AD/LDAP administrator user
Encryption type
Specify the encryption type as secure or non-secure.
In secure method, SSL/TLS is the encryption method.
If you choose the Encryption type to be SSL/TLS, you have to upload the certificate that you want to use to encrypt and secure the connection with the AD/LDAP server. Click Choose file and upload the certificate.
- Click Configure.
- You can test the connection after you configure it. Click Test connection. You receive notifications after the successful completion/failure of the test connection.
The AD/LDAP details appear in the
tab.You can perform a test connection to validate the AD/LDAP configuration. On the same page, there is an option to remove the AD configuration.