NetBackup™ Web UI Administrator's Guide
- Introducing the NetBackup web user interface
- Monitoring and notifications
- Job monitoring
- Job notifications
- NetBackup event notifications
- Section I. Managing hosts
- Managing host properties
- Managing credentials for workloads and systems that NetBackup accesses
- Managing deployment
- Section II. Configuring storage and backups
- Configuring storage
- Overview of backups in the web UI
- Managing protection plans
- Managing classic policies
- Managing backup images
- Pausing data protection activity
- Configuring storage
- Section III. Managing security
- Security events and audit logs
- Managing security certificates
- Managing host mappings
- Managing user sessions
- Managing the security settings for the primary server
- About trusted primary servers
- Using access keys, API keys, and access codes
- Configuring authentication options
- Managing role-based access control
- Configuring RBAC
- Add a custom RBAC role
- Section IV. Detection and reporting
- Detecting malware
- Detecting anomalies
- Usage reporting and capacity licensing
- Detecting malware
- Section V. NetBackup workloads and NetBackup Flex Scale
- Section VI. Disaster recovery and troubleshooting
Add a custom RBAC role to restore Azure-managed instances
To restore Azure-managed instances, users must have the view permission for these instances. Administrators and similar users can provide other users with a custom role and this permission.
To assign the view permission for Azure-managed instances
- To get the access control ID of the managed instance, enter the following command:
GET /asset-service/workloads/cloud/assets?filter=extendedAttributes/ managedInstanceName eq 'managedInstanceName'
Search for accessControlId field in the response. Note down the value of this field.
- To get the role ID, enter the following command:
GET /access-control/roles
Search for the id field in the response. Note down the value of this field.
- Create an access definition, as follows:
POST /access-control/managed-objects/{objectId}/access-definitions
Request payload
{ "data": { "type": "accessDefinition", "attributes": { "propagation": "OBJECT_AND_CHILDREN" }, "relationships": { "role": { "data": { "id": "<roleId>", "type": "accessControlRole" } }, "operations": { "data": [ { "id": "|OPERATIONS|VIEW|", "type": "accessControlOperation" } ] }, "managedObject": { "data": { "id": "<objectId>", "type": "managedObject" } } } } }
Use the following values:
objectId: Use the value of accessControlId obtained from step 1.
roleId: Use the value of id obtained from step 2.
Note:
For an alternate restore, provide the |OPERATIONS|ASSETS|CLOUD|RESTORE_DESTINATION| permission in the operations list.