NetBackup™ Web UI Administrator's Guide
- Introducing the NetBackup web user interface
- Monitoring and notifications
- Section I. Configuring hosts
- Section II. Configuring storage and backups
- Configuring storage
- Managing protection plans
- Managing classic policies
- Managing backup images
- Configuring storage
- Section III. Managing credentials
- Managing credentials for workloads and systems that NetBackup accesses
- Managing credentials for workloads and systems that NetBackup accesses
- Section IV. Managing security
- Security events and audit logs
- Managing security certificates
- Managing host mappings
- Managing user sessions
- Managing the security settings for the primary server
- About trusted primary servers
- Access keys
- Configuring authentication options
- Section V. Managing role-based access control
- About role-based access control in NetBackup
- Configuring RBAC roles
- Configuring RBAC
- Default RBAC roles
- Configuring RBAC
- RBAC permissions
- Global > NetBackup management
- Global > Security
- Global > Storage
- Assets
- Manage access
- Section VI. Managing detection and reporting
- Managing deployment
- Managing Resiliency Platforms
- NetBackup SaaS Protection
- NetBackup Flex Scale
- Managing Bare Metal Restore (BMR)
- Troubleshooting the NetBackup Web UI
Accessing Azure managed instance for RBAC custom role
Administrators and root users or any other users with access to assign permissions, can provide other users with custom role and the required permission to view Azure managed instance while performing restore operation.
To assign access:
- Get the Access control id of the managed instance, using:
GET /asset-service/workloads/cloud/assets?filter=extendedAttributes/managedInstanceName eq 'managedInstanceName'
Search for accessControlId field in the response. Note down the value of this field.
- Get the Role id, using:
GET /access-control/roles
Search for the id field in the response. Note down the value of this field.
- Create an Access definition, using:
POST /access-control/managed-objects/{objectId}/access-definitions
Request payload
{ "data": { "type": "accessDefinition", "attributes": { "propagation": "OBJECT_AND_CHILDREN" }, "relationships": { "role": { "data": { "id": "<roleId>", "type": "accessControlRole" } }, "operations": { "data": [ { "id": "|OPERATIONS|VIEW|", "type": "accessControlOperation" } ] }, "managedObject": { "data": { "id": "<objectId>", "type": "managedObject" } } } } }
For,
objectId : Use the value of accessControlId obtained from step 1.
roleId : Use the value of id obtained from step 2.
Note:
For alternate restore, provide the |OPERATIONS|ASSETS|CLOUD|RESTORE_DESTINATION| permission in the operations list.