NetBackup™ Web UI Administrator's Guide
- Introducing the NetBackup web user interface
- Section I. Managing security
- Monitoring and notifications
- Managing role-based access control
- About role-based access control (RBAC) in NetBackup
- Configuring RBAC
- Role permissions
- Global > NetBackup management
- Access hosts
- Email notifications
- Data classification
- Event logs
- NetBackup hosts
- Image sharing
- NetBackup backup images
- Jobs
- Licensing
- Media server
- Remote master server certificate authority
- Resiliency
- Resource limits
- Retention levels
- Servers > Trusted master servers
- Cloud providers
- CloudPoint servers
- WebSocket servers
- Global > Protection
- Global > Security
- Global > Storage
- Assets
- Protection plans
- Credentials
- Global > NetBackup management
- Manage access
- Configure an external certificate for the NetBackup web server
- Security events and audit logs
- Managing security certificates
- Managing user sessions
- Managing master server security settings
- Certificate authority for secure communication
- Disable communication with NetBackup 8.0 and earlier hosts
- Disable automatic mapping of NetBackup host names
- About NetBackup certificate deployment security levels
- Select a security level for NetBackup certificate deployment
- Set a passphrase for disaster recovery
- About trusted master servers
- Creating and using API keys
- Configuring authentication options
- Managing hosts
- Troubleshooting the web UI
- Section II. Managing storage and backups
- Configuring storage
- About storage configuration
- Create a Media Server Deduplication Pool (MSDP) storage server
- Create a Cloud (Cloud Catalyst), OpenStorage, or AdvancedDisk storage server
- Create a disk pool
- Create a storage unit
- Create a universal share
- Using image sharing from the NetBackup Web UI
- Troubleshooting storage configuration
- Troubleshooting universal share configuration issues
- Managing protection plans
- Managing protection plans for Microsoft SQL Server
- Usage reporting and capacity licensing
- Configuring storage
- Section III. Veritas Resiliency Platform
- Section IV. Managing credentials
Unable to add AD or LDAP domains with the vssat command
After you add an AD or LDAP domain, you can verify the configuration with the vssat validateprpl command and for groups with the vssat validategroup command. If a domain is not added successfully, the vssat validation displays The principal or group does not exist. More details are written to the nbatd logs.
Validation of an AD or LDAP user can fail for any of the following reasons:
The connection cannot be established with the AD or LDAP server
Incorrect user credentials were provided
An incorrect user base DN or group base DN was provided
Multiple users or groups exist with the same name under the user base DN or the group base DN
The user or group does not exist
For information about the vssat command, see the NetBackup Commands Reference Guide.