Veritas NetBackup™ Security and Encryption Guide
- Increasing NetBackup security
- Security deployment models
- Port security
- About NetBackup daemons, ports, and communication
- Additional port information for products that interoperate with NetBackup
- About configuring ports
- Auditing NetBackup operations
- About Enhanced Auditing
- Access control security
- NetBackup Access Control Security (NBAC)
- Configuring NetBackup Access Control (NBAC)
- Configuring Access Control host properties for the master and media server
- Access Control host properties dialog for the client
- Troubleshooting Access Management
- Windows verification points
- UNIX verification points
- Verification points in a mixed environment with a UNIX master server
- Verification points in a mixed environment with a Windows master server
- About determining who can access NetBackup
- Viewing specific user permissions for NetBackup user groups
- About AD and LDAP domains
- Security management using NetBackup CA and NetBackup certificates
- About the Security Management utilities
- About audit events
- About host management
- Adding shared or cluster mappings
- Allowing or disallowing automatic certificate reissue
- About global security settings
- About host name-based certificates
- About host ID-based certificates
- Using the Certificate Management utility to issue and deploy host ID-based certificates
- About NetBackup certificate deployment security levels
- Setting up trust with the master server (Certificate Authority)
- About reissuing host ID-based certificates
- About Token Management for host ID-based certificates
- About the host ID-based certificate revocation list
- About revoking host ID-based certificates
- Host ID-based certificate deployment in a clustered setup
- About deployment of a host ID-based certificate on a clustered NetBackup host
- External CA support in NetBackup
- About external CA support in NetBackup
- Configuration options for external CA-signed certificates
- ECA_CERT_PATH for NetBackup servers and clients
- About certificate revocation lists for external CA
- About certificate enrollment
- Configuring an external certificate for the NetBackup web server
- About external certificate configuration for a clustered master server
- About API keys in NetBackup
- Data at rest encryption security
- About NetBackup client encryption
- Configuring standard encryption on clients
- About configuring standard encryption from the server
- Configuring legacy encryption on clients
- About configuring legacy encryption from the client
- About configuring legacy encryption from the server
- Additional legacy key file security for UNIX clients
- Data at rest key management
- About the Key Management Service (KMS)
- Installing KMS
- Configuring KMS
- About key groups and key records
- Overview of key record states
- Configuring NetBackup to work with KMS
- About using KMS for encryption
- KMS database constituents
- Command line interface (CLI) commands
- About exporting and importing keys from the KMS database
- Troubleshooting KMS
- Regenerating keys and certificates
- NetBackup web services account
Using NetBackup Access Control (NBAC) with Auto Image Replication
If Auto Image Replication is configured for two domains and NetBackup Access Control (NBAC) is used, it must be used in both the source domain and the target domain. The configuration for the master servers must be either USE_VXSS = REQUIRED or USE_VXSS = AUTOMATIC. (However, the setting may be REQUIRED in one domain and AUTOMATIC in the other.
Auto Image Replication is not supported between master server domains where one master server is configured to use NBAC and NBAC is disabled on the other master server. That is, the configuration for one master server is USE_VXSS = AUTOMATIC or USE_VXSS = REQUIRED and on the other master server it is USE_VXSS = PROHIBITED (disabled).
The following configuration is necessary if NBAC is used in the master server domains:
In the source master server domain:
The administrator should make sure that the target master server has the permissions set correctly before configuration for the operation begins.
In the target master server domain:
The security administrator in the target domain must give the administrator in the source domain the correct set of permissions. The source domain administrator needs Browse, Read, and Configure permissions on the following objects:
, , and .The source domain administrator can be added as a member to any existing group which has all three permissions.
Consider the following example:
Two NBAC domains each contain a master server:
Replication source NBAC domain: DomainA contains Master-A
Replication target NBAC domain: DomainB contains Master-B
NBAC is enabled in both the domains. (If NBAC is used in one domain, it must be used in the other domain.)
For UserA to create an Auto Image Replication SLP with Master-B as the target, UserA needs permission on Master-B to do so.
A security administrator (UserB) in DomainB must create a user group (NB_InterDomainUsers, for example) and give Browse, Read, and Configure permissions in the following areas:
DiskPool
DevHost
The security administrator in DomainB (UserB) then assigns NB_InterDomainUsers to DomainA\UserA using the bpnbaz -AddUser command.