NetBackup IT Analytics System Administrator Guide
- Introduction
- Preparing for updates
- Backing up and restoring data
- Monitoring NetBackup IT Analytics
- Accessing NetBackup IT Analytics reports with the REST API
- Defining NetBackup estimated tape capacity
- Automating host group management
- Categorize host operating systems by platform and version
- Bulk load utilities
- Automate NetBackup utilities
- Scheduling utilities to run automatically
- Attribute management
- Importing generic backup data
- Backup job overrides
- Managing host data collection
- System configuration in the Portal
- Custom parameters
- Performance profile schedule customization
- LDAP and SSO authentication for Portal access
- Change Oracle database user passwords
- Integrate with CyberArk
- Tuning NetBackup IT Analytics
- Working with log files
- Portal and data collector log files - reduce logging
- Data collector log file naming conventions
- Portal log files
- Defining report metrics
- SNMP trap alerting
- SSL certificate configuration
- Configure virtual hosts for portal and / or data collection SSL
- Keystore on the portal server
- Portal properties: Format and portal customizations
- Data retention periods for SDK database objects
- Data aggregation
- Troubleshooting
- Appendix A. Kerberos based proxy user's authentication in Oracle
- Appendix B. Configure TLS-enabled Oracle database on NetBackup IT Analytics Portal and data receiver
- Appendix C. NetBackup IT Analytics for NetBackup on Kubernetes and appliances
Configuring LDAP to use active directory (AD) for user group privileges
This attribute enables administrators to control access to privileges through user creation and group membership assignments in their enterprise LDAP. Create AD user groups with the same name in the Portal, add the following parameters, then when new users are added to AD, they will be automatically added to the corresponding portal-based user groups and inherit the group privileges.
External LDAP may be used.
User Groups with the same names must exist in both Active Directory and the portal.
If a user is assigned to a User Group they acquire all associated privileges of that User Group.
LDAP authorization is enabled by adding two lines to the portal.properties:
ldap.authorization - Indicates if Active Directory user groups should be used for authorization. When set to true, the user permissions from a group perspective are derived solely from the AD groups they belong to that have a corresponding group defined withinNetBackup IT Analytics. If set to false (the default), user permissions are derived fromNetBackup IT Analytics.
ldap.newUserDomain - Must be a domain that exists in the APTARE IT Analytics portal. This is assigned during user creation and is based on the domain of the user's home group.
Note:
For
: AD users must be manually created in portal so that they can login using AD credentials. For : AD users will be automatically created in the portal.Enable LDAP authorization using the portal.properties file:
Linux:
/opt/aptare/portalconf/portal.properties
Windows:
C;\opt\aptare\portalconf\portal.properties
Add the following lines:
ldap.authorization=true
ldap.newUserDomain=<string>
Restart the Tomcat Portal services.