NetBackup™ Web UI Administrator's Guide
- Introducing the NetBackup web user interface
- Monitoring and notifications
- Section I. Configuring hosts
- Section II. Configuring storage and backups
- Configuring storage
- Managing protection plans
- Managing classic policies
- Managing backup images
- Configuring storage
- Section III. Managing credentials
- Managing credentials for workloads and systems that NetBackup accesses
- Managing credentials for workloads and systems that NetBackup accesses
- Section IV. Managing security
- Security events and audit logs
- Managing security certificates
- Managing host mappings
- Managing user sessions
- Managing the security settings for the primary server
- About trusted primary servers
- Access keys
- Configuring authentication options
- Section V. Managing role-based access control
- About role-based access control in NetBackup
- Configuring RBAC roles
- Configuring RBAC
- Default RBAC roles
- Configuring RBAC
- RBAC permissions
- Global > NetBackup management
- Global > Security
- Global > Storage
- Assets
- Manage access
- Section VI. Managing detection and reporting
- Managing deployment
- Managing Resiliency Platforms
- NetBackup SaaS Protection
- NetBackup Flex Scale
- Managing Bare Metal Restore (BMR)
- Troubleshooting the NetBackup Web UI
Unable to sign in due to authorization-related issues
To sign in with SSO, you must add SAML users and the SAML user groups to the necessary RBAC roles. If the RBAC roles are not correctly assigned, you might encounter the following error while signing into NetBackup web UI.
You are not authorized to access this application. Contact your NetBackup security administrator to request RBAC permissions for the NetBackup web user interface.
Refer to the table below to troubleshoot authorization-related issues:
Table:
Cause | Explanation and recommended action |
---|---|
RBAC roles are not assigned to the SAML users and the SAML groups. | After an IDP configuration is added and enabled on the NetBackup primary server, ensure that necessary RBAC roles are assigned to SAML users and SAML user groups that use SSO. Note that SAML users and SAML user groups are available in RBAC only after the IDP configuration is added and enabled on the NetBackup primary server. For steps on adding users, See Add a user to a role (non-SAML). |
RBAC roles are assigned to SAML users and SAML user groups associated with an IDP configuration that is not currently added and enabled. | When you add a SAML users or SAML user group in RBAC, the SAML user or SAML user group entry is associated with the IDP configuration that is added and enabled at that time. If you add and enable a new IDP configuration, ensure that you also add another entry for the SAML user or SAML user group. The new entry is associated with the new IDP configuration. For example, NBU_user is added to RBAC and assigned the necessary permissions, while an ADFS IDP configuration is added and enabled. If you add and enable an Okta IDP configuration, you must add a new user entry for NBU_user. Assign the necessary RBAC roles to the new user entry, which is associated with the Okta IDP configuration. For steps on adding users, See Add a user to a role (non-SAML). |
RBAC roles are assigned to local domain users or Active Directory (AD) or LDAP domain users (instead of SAML users and SAML user groups). | SAML user or SAML user group records might appear similar to corresponding local domain users or AD or LDAP domain users already added in the RBAC. After an IDP configuration is added and enabled on the NetBackup primary server, ensure that you add SAML users and SAML user groups in RBAC and assign the necessary permissions. Note that SAML users and SAML user groups are available in RBAC only after the IDP configuration is added and enabled on the NetBackup primary server. For steps on adding SAML users and user groups, See Add a user to a role (non-SAML). |
The NetBackup primary server is unable to retrieve user group information from the IDP | The IDP sends SAML responses to the NetBackup primary server, which contains SAML user and SAML user group information. To enable the IDP to successfully send this information, ensure the following:
|