Please enter search query.
Search <book_title>...
NetBackup™ Web UI Administrator's Guide
Last Published:
2021-06-11
Product(s):
NetBackup (9.1)
- Introducing the NetBackup web user interface
- Monitoring NetBackup
- Notifications
- Section I. Managing role-based access control
- About role-based access control in NetBackup
- Configuring RBAC roles
- Configuring RBAC
- Default RBAC roles
- RBAC permissions
- Global > NetBackup management
- Global > Security
- Global > Storage
- Assets
- Manage access
- Section II. Managing security
- Security events and audit logs
- Managing security certificates
- Managing user sessions
- Managing master server security settings
- About trusted primary servers
- Creating and managing API keys for users (Administrators)
- Adding and managing your API key (Users)
- Configuring authentication options
- Managing hosts
- Section III. Managing storage and backups
- Configuring storage
- Managing protection plans
- Managing classic policies
- Usage reporting and capacity licensing
- Configuring storage
- Section IV. Veritas Resiliency Platform
- Section V. Credentials
- Troubleshooting the NetBackup Web UI
Multiple users or groups exist with the same name under user base DN or group base DN
To troubleshoot the issue
- Check if the nbatd logs contain the following error:
CAuthLDAP::validateGroup - search returned '2' entries for group name 'team_noone', even with referrals set to OFF,9:debugmsgs,1
- Validate the number of matching entries for the existing base DN using the ldapsearch command:
ldapsearch -H <LDAP_URI> -D "<admin_user_DN>" -w <passwd> -d <debug_level> -o nettimeout=<seconds> -b <BASE_DN> <search_filter>
This is applicable if user search attribute (-a option) and group search attribute (-y option) do not have unique values for the existing user base DN and group base DN respectively.
Example of validation message:
ldapsearch -H ldap://example.veritas.com:389 -D "CN=Test User,OU=VRTSUsers,DC=VRTS,DC=com" -w ****** -b "DC=VRTS,DC=com" "(&(cn=test user)(objectClass=user))" # LDAPv3 # base <DC=VRTS,DC=com> with scope subtree # filter: (cn=Test User) # requesting: ALL # Test User, VRTSUsers, VRTS.com dn: CN=Test User,OU=VRTSUsers,DC=VRTS, DC=com # Test User, RsvUsers, VRTS.com dn: CN=Test User,OU=RsvUsers,DC=VRTS,DC=com # numEntries: 2