NetBackup™ Web UI Cloud Administrator's Guide
- Managing and protecting cloud assets
- Configure Snapshot Manager in NetBackup
- Managing intelligent cloud groups
- Protecting cloud assets or intelligent cloud groups
- About protecting Microsoft Azure resources using resource groups
- About the NetBackup Accelerator for cloud workloads
- Protecting PaaS assets
- Installing the native client utilities
- Configuring storage for different deployments
- Add credentials to a database
- Recovering cloud assets
- Performing granular restore
- Troubleshooting protection and recovery of cloud assets
Creating a system or user managed identity username
Do any of the following configurations:
Configure managed identity user as AAD admin:
Set AAD admin on the SQL server or the Managed instance.
Go to Settings > Azure Active Directory > Set admin. Search and set system-assigned or user-assigned managed identity, and save.
Note:
Only those media servers configured as system-assigned managed identity as AAD admin can perform backup and restore.
Create managed identity user on the database using SSMS client:
To set AAD admin for SQL server to create user, go to Settings > Active Directory admin > Set admin. Pick active directory the user, and save.
Login to the SQL database or Managed database to create user under that database.
CREATE USER [<managed_identity>] FROM EXTERNAL PROVIDER; ALTER ROLE db_owner ADD MEMBER [<managed_identity>];
Provide login permission for that user on the SQL Server, run
# CREATE USER [<managed_identity>] FROM EXTERNAL PROVIDER; # ALTER ROLE loginmanager ADD MEMBER [<managed_identity>];
Note:
You must create users for all media servers communicating with the database using the system-assigned managed identity.
Note:
To restore database, you must configure the managed identity user as AAD admin on the target server.
To configure the AAD admin for MySQL server to create user, go to Settings > Active Directory admin > Set admin. Pick the active directory user, and save.
Get the client ID for managed identity using Azure CLI, run
# az ad sp list --display-name <managed_identity> --query [*].appId --out tsv
Generate access token to login, using Azure CLI, run:
# az account get-access-token --resource-type oss-rdbms
Login using the AAD admin user and access token, run:
# mysql -h <server name> --user <user name> --enable-cleartext-plugin --password=<token>
Create the manage identity user and grant the permissions, run:
# SET aad_auth_validate_oids_in_tenant = OFF; # CREATE AADUSER '<db_user>' IDENTIFIED BY '<Generated_client_id>'; # GRANT USAGE, DROP, SELECT, CREATE, SHOW VIEW, EVENT, LOCK TABLES , ALTER, CREATE VIEW, INSERT, REFERENCES, ALTER ROUTINE, PROCESS ON *.* TO '<db_user>'@'%'
To configure the AAD admin for PostgreSQL server to create user, go to Settings > Active Directory admin > Set admin. Pick the active directory user, and save.
Get client ID for the managed identity:
# az ad sp list --display-name <managed_identity> --query [*].appId --out tsv
Generate the access token required to login, run:
# az account get-access-token --resource-type oss-rdbms
Export the password for the generated token, run:
# export PGPASSWORD=<token>
Login using the AAD admin user and the access token, run:
# psql "host=<host name> port=5432 dbname=<dbname> user=<user name> sslmode=require"
Create user and grant permission, run:
# SET aad_auth_validate_oids_in_tenant = OFF; # CREATE ROLE <db_user> WITH LOGIN PASSWORD '<client_id>' IN ROLE azure_ad_user; # GRANT azure_pg_admin TO <db_user>; # ALTER USER smipguser CREATEDB; # ALTER USER smipguser Replication;
Note:
Only user managed identity is supported for MySQL Flexible Server. Managed Identity support is not available for PostgreSQL Flexible Server.
Log on to your Azure portal.
To assign the Cosmos DB Built-in Data Contributor role to the managed identity, run the command:
# az cosmosdb sql role assignment create -a <Account_Name> -g <Resource_Group_Name> -s "/" -p <Object_ID/Principle_ID> -d 00000000-0000-0000-0000-000000000002
Where:
Account_Name is the Azure Cosmos account name.
Resource_Group_Name is the Resource group name of the account.
Object_ID/Principle_ID is the Managed identity object or principle ID.
00000000-0000-0000-0000-000000000002 is the Cosmos DB Built-in Data Contributor role ID.