Please enter search query.
Search <book_title>...
NetBackup™ Web UI Administrator's Guide
Last Published:
2020-07-29
Product(s):
NetBackup (8.3.0.1, 8.3)
- Introducing the NetBackup web user interface
- Section I. Managing security
- Monitoring and notifications
- Managing role-based access control
- Configuring RBAC
- Role permissions
- Global > NetBackup management
- Global > Security
- Global > Storage
- Global > NetBackup management
- Manage access
- Configure an external certificate for the NetBackup web server
- Security events and audit logs
- Managing security certificates
- Managing user sessions
- Managing master server security settings
- About trusted master servers
- Creating and using API keys
- Configuring authentication options
- Managing hosts
- Troubleshooting the web UI
- Section II. Managing storage and backups
- Configuring storage
- Managing protection plans
- Managing protection plans for Microsoft SQL Server
- Usage reporting and capacity licensing
- Configuring storage
- Section III. Veritas Resiliency Platform
- Section IV. Managing credentials
Configuring a third-party CA certificate
You can use a self-signed or a third-party certificate to validate your Resiliency manager.
Consider the following points:
For Windows, you can give a certificate as a file path or install the third-party certificate in the Trusted root certificates authorities.
To switch from a self-signed certificate to a third-party certificate for an already added Resiliency Platform, you can edit the Resiliency Platform.
To configure a third-party CA certificate
- Copy a PKCS #7 or P7B file having certificates of the trusted root certificates authorities that are bundled together. This file may either be PEM or DER encoded.
- Create a CA file containing the PEM encoded certificates of the trusted root certificate authorities that are concatenated together.
- In the bp.conf file, create the following entries, where /certificate.pem is the file name:
ECA_TRUST_STORE_PATH = /certificate.pem
Verify that the nbwebsvc account has the permissions to access the path that ECA_TRUST_STORE_PATH refers.