Please enter search query.
Search <book_title>...
NetBackup™ Web UI Administrator's Guide
Last Published:
2022-03-28
Product(s):
NetBackup (10.0)
- Introducing the NetBackup web user interface
- Monitoring and notifications
- Section I. Configuring hosts
- Section II. Configuring storage and backups
- Configuring storage
- Managing protection plans
- Managing classic policies
- Managing backup images
- Configuring storage
- Section III. Managing credentials
- Managing credentials for workloads and systems that NetBackup accesses
- Managing credentials for workloads and systems that NetBackup accesses
- Section IV. Managing security
- Security events and audit logs
- Managing security certificates
- Managing host mappings
- Managing user sessions
- Managing the security settings for the primary server
- About trusted primary servers
- Access keys
- Configuring authentication options
- Section V. Managing role-based access control
- About role-based access control in NetBackup
- Configuring RBAC roles
- Configuring RBAC
- Default RBAC roles
- Configuring RBAC
- RBAC permissions
- Global > NetBackup management
- Global > Security
- Global > Storage
- Assets
- Manage access
- Section VI. Managing detection and reporting
- Managing deployment
- Managing Resiliency Platforms
- NetBackup SaaS Protection
- NetBackup Flex Scale
- Managing Bare Metal Restore (BMR)
- Troubleshooting the NetBackup Web UI
About credential management in NetBackup
lets you centrally manage the credentials that NetBackup uses to access systems and the workloads that it protects.
Credentials can be managed for the following workloads:
Cassandra
Cloud (for a cloud instance)
Kubernetes
Microsoft SQL Server
Nutanix AHV
Oracle
SaaS
Credentials can also be managed for the following systems:
A Call Home proxy server
Disk arrays
External Key Management Services (KMS)
NDMP
Malware detection
More information
See Add a credential for NetBackup Callhome Proxy.
See Add a credential for an external KMS.
See Add a credential for Network Data Management Protocol (NDMP).
See the Veritas Usage Insights Getting Started Guide for details on using a Call Home proxy server.
To configure credentials for a workload (for example, SQL Server), refer to the guide for that workload for details.