Please enter search query.
Search <book_title>...
NetBackup™ Web UI Administrator's Guide
Last Published:
2022-09-09
Product(s):
NetBackup & Alta Data Protection (10.1)
- Introducing the NetBackup web user interface
- Monitoring and notifications
- Job monitoring
- Job notifications
- NetBackup event notifications
- Section I. Managing hosts
- Managing host properties
- Managing credentials for workloads and systems that NetBackup accesses
- Managing deployment
- Section II. Configuring storage and backups
- Configuring storage
- Overview of backups in the web UI
- Managing protection plans
- Managing classic policies
- Managing backup images
- Pausing data protection activity
- Configuring storage
- Section III. Managing security
- Security events and audit logs
- Managing security certificates
- Managing host mappings
- Managing user sessions
- Managing the security settings for the primary server
- About trusted primary servers
- Using access keys, API keys, and access codes
- Configuring authentication options
- Managing role-based access control
- Configuring RBAC
- Add a custom RBAC role
- Section IV. Detection and reporting
- Detecting malware
- Detecting anomalies
- Usage reporting and capacity licensing
- Detecting malware
- Section V. NetBackup workloads and NetBackup Flex Scale
- Section VI. Disaster recovery and troubleshooting
Overview of credential management in NetBackup
lets you centrally manage the credentials that NetBackup uses to access systems and the workloads that it protects.
Credentials can be managed for the following workloads:
Cassandra
Cloud (for a cloud instance)
Kubernetes
Microsoft SQL Server
Nutanix AHV
Oracle
SaaS
Credentials can also be managed for the following systems:
A Call Home proxy server
Disk arrays
External Key Management Services (KMS)
Malware detection (Malware scan host)
NDMP
More information
See Add a credential for NetBackup Callhome Proxy.
See Add a credential for an external KMS.
See Add a credential for Network Data Management Protocol (NDMP).
See the Veritas Usage Insights Getting Started Guide for details on using a Call Home proxy server.
To configure credentials for a workload (for example, SQL Server), refer to the guide for that workload for details.