Please enter search query.
Search <book_title>...
NetBackup™ Web UI Administrator's Guide
Last Published:
2020-07-29
Product(s):
NetBackup (8.3.0.1, 8.3)
- Introducing the NetBackup web user interface
- Section I. Managing security
- Monitoring and notifications
- Managing role-based access control
- About role-based access control (RBAC) in NetBackup
- Configuring RBAC
- Role permissions
- Global > NetBackup management
- Access hosts
- Email notifications
- Data classification
- Event logs
- NetBackup hosts
- Image sharing
- NetBackup backup images
- Jobs
- Licensing
- Media server
- Remote master server certificate authority
- Resiliency
- Resource limits
- Retention levels
- Servers > Trusted master servers
- Cloud providers
- CloudPoint servers
- WebSocket servers
- Global > Protection
- Global > Security
- Global > Storage
- Assets
- Protection plans
- Credentials
- Global > NetBackup management
- Manage access
- Configure an external certificate for the NetBackup web server
- Security events and audit logs
- Managing security certificates
- Managing user sessions
- Managing master server security settings
- Certificate authority for secure communication
- Disable communication with NetBackup 8.0 and earlier hosts
- Disable automatic mapping of NetBackup host names
- About NetBackup certificate deployment security levels
- Select a security level for NetBackup certificate deployment
- Set a passphrase for disaster recovery
- About trusted master servers
- Creating and using API keys
- Configuring authentication options
- Managing hosts
- Troubleshooting the web UI
- Section II. Managing storage and backups
- Configuring storage
- About storage configuration
- Create a Media Server Deduplication Pool (MSDP) storage server
- Create a Cloud (Cloud Catalyst), OpenStorage, or AdvancedDisk storage server
- Create a disk pool
- Create a storage unit
- Create a universal share
- Using image sharing from the NetBackup Web UI
- Troubleshooting storage configuration
- Troubleshooting universal share configuration issues
- Managing protection plans
- Managing protection plans for Microsoft SQL Server
- Usage reporting and capacity licensing
- Configuring storage
- Section III. Veritas Resiliency Platform
- Section IV. Managing credentials
Configuring a third-party CA certificate
You can use a self-signed or a third-party certificate to validate your Resiliency manager.
Consider the following points:
For Windows, you can give a certificate as a file path or install the third-party certificate in the Trusted root certificates authorities.
To switch from a self-signed certificate to a third-party certificate for an already added Resiliency Platform, you can edit the Resiliency Platform.
To configure a third-party CA certificate
- Copy a PKCS #7 or P7B file having certificates of the trusted root certificates authorities that are bundled together. This file may either be PEM or DER encoded.
- Create a CA file containing the PEM encoded certificates of the trusted root certificate authorities that are concatenated together.
- In the bp.conf file, create the following entries, where /certificate.pem is the file name:
ECA_TRUST_STORE_PATH = /certificate.pem
Verify that the nbwebsvc account has the permissions to access the path that ECA_TRUST_STORE_PATH refers.