Veritas NetBackup™ Flex Scale Administrator's Guide
- Product overview
- Viewing information about the NetBackup Flex Scale cluster environment
- NetBackup Flex Scale infrastructure management
- User management
- Considerations for managing NetBackup Flex Scale users
- Adding users
- Changing user password
- Removing users
- Modifying user roles
- Considerations for configuring AD/LDAP
- Configuring AD server for Universal shares and Instant Access
- Configuring AD/LDAP servers for NetBackup services
- Configuring additional AD/LDAP servers for managing NetBackup services/Universal Shares/Instant Access
- Configuring AD/LDAP servers on clusters deployed with only media servers
- Directory services and certificate management
- Region settings management
- About NetBackup Flex Scale storage
- About Universal Shares
- Cloud bucket support for NetBackup Flex Scale
- Backing up data to Data Domain storage
- Node and disk management
- NetBackup Flex Scale network cabling
- Adding a node to the cluster using the NetBackup Flex Scale web interface
- Adding a node using the REST APIs
- Replacing a node in a cluster
- Starting and stopping nodes
- Rebooting a node
- Adding an excluded node to the cluster
- Replacing a disk
- Adding an excluded disk to the cluster
- Viewing the disk sync status
- Viewing disk details
- Viewing node details
- Switching management console to another cluster node
- License management
- Stopping NetBackup service containers
- Starting NetBackup service containers
- Managing the Fibre Channel ports
- Requirements
- Enabling BOM (Bill of Materials) configuration for Fibre Channel
- Assigning Fibre Channel ports
- Discovering attached devices
- Rescanning Fibre Channel cards
- Cleaning Fibre Channel ports
- Unassigning Fibre Channel ports
- Viewing details about the Fibre Channel ports
- Disabling BOM (Bill of Materials) configuration for Fibre Channel
- Managing hardware vendor packages
- Updating credentials for HPE iLO administrator users
- User management
- NetBackup Flex Scale network management
- About network management
- Modifying DNS settings
- Configuring MTU on public interfaces
- Configuring the console FQDN
- About bonding Ethernet interfaces
- Bonding operations
- Configuring NetBackup Flex Scale in a non-DNS environment
- Data network configurations
- Choosing the correct input method for data network configuration
- Network configuration on plain device (eth5)
- Network configuration on VLAN (eth5)
- Network configuration on bonded interfaces (bond0 on eth5 and eth7)
- VLAN on bond of eth5 and eth7 (bond0)
- Network configuration on management interface (eth1)
- Network configurations for adding a partial data network
- Support for multiple VLAN when disaster recovery is configured
- Configuring static routes on a NetBackup Flex Scale cluster
- NetBackup Flex Scale infrastructure monitoring
- Resiliency in NetBackup Flex Scale
- EMS server configuration
- Site-based disaster recovery in NetBackup Flex Scale
- About site-based disaster recovery in NetBackup Flex Scale
- Configuring disaster recovery using GUI
- Clearing the host cache
- Automated NetBackup SLP management
- DNS key management
- Managing disaster recovery using GUI
- Performing disaster recovery using RESTful APIs
- Active-Active disaster recovery configuration
- NetBackup optimized duplication using Storage Lifecycle Policies
- NetBackup Flex Scale security
- About the security meter
- STIG overview for NetBackup Flex Scale
- FIPS overview for NetBackup Flex Scale
- Managing the login banner
- Changing the password policy
- Support for immutability in NetBackup Flex Scale
- Authenticating users using digital certificates or smart cards
- About system certificates on NetBackup Flex Scale
- Deploying external certificates on NetBackup Flex Scale
- Configuring isolated recovery environment (IRE)
- Configuring multifactor authentication
- About multifactor authentication
- Considerations before configuring multifactor authentication
- Configuring multifactor authentication for your user account
- Disabling multifactor authentication for your user account
- Enforcing multifactor authentication for all users
- Configuring multifactor authentication for your user account when it is enforced in the cluster
- Resetting multifactor authentication for a user
- Single Sign-On (SSO)
- Appendix A. Maintenance procedures for HPE servers
- Replacement procedure for a chassis fan
- Replacement procedure for power supply
- Replacement procedure for a single OS disk
- Replacement procedure for both OS disks on a non- management console node
- Replacement procedure for NVMe disks (SSDs)
- Replacement procedure for RAID controller
- Replacement procedure for an Integrated Lights-Out (iLO) port
- Replacement procedure for quad-port NIC
- Procedure for memory expansion (DIMMs)
- Replacement procedure for memory (DIMMs)
- Replacement procedure for Mellanox port
- Replacement procedure for SFP port
- Replacement procedure for chassis
- Replacement procedure for a hard disk drive
- Replacement procedure for a Fibre Channel card for a cluster node
- Replacement procedure for a Fibre Channel card for a node that is not in a cluster
- Appendix B. Configuring NetBackup optimized duplication
- Appendix C. Disaster recovery terminologies
- Appendix D. Configuring Auto Image Replication
Authenticating users using digital certificates or smart cards
You can configure NetBackup Flex Scale to authenticate users with a smart card or a digital certificate. After configuration, the users can use the option to sign in to NetBackup Flex Scale UI using smart cards or digital certificates.
Before you configure user authentication using smart cards or digital certificates, note the following:
Digital certificate or smart card authentication can be configured for LDAP, AD, and local users.
Ensure that LDAP is configured if you want to authenticate LDAP users by using digital certificate or smart card.
Ensure that AD is configured if you want to authenticate AD users by using digital or smart.
Ensure that you create a local user if you want to authenticate local users by using digital or smart card.
Smart card authentication requires a list of trusted root or intermediate CA certificates. You must add the CA certificates that are associated with the user digital certificates or the user smart cards.
To authenticate users with a certificate or smart card for media server only deployment:
- Use a user account with an Appliance Administrator role to log in to the NetBackup Flex Scale infrastructure management UI
https://consoleIP:14161where consoleIP is the public IP address that you specified for the infrastructure management UI during the cluster configuration. - In the left pane click Settings > Security > Smart card authentication.
- Use the slider to turn on smart card authentication.
- In the Configure smart card authentication dialog box, specify the following options:
In the user authentication domain list, specify the following information:
None, which is a default option, indicates that only local users can be authenticated using smart card.
For an AD user, select the configured AD server.
For an LDAP user, select the configured LDAP server.
Under Certificate mapping attribute, to specify the user using the username format, click Common name. To specify the user using the username and domain format (for example, username@test.com) click User principal name.
Optionally, enter the Online Certificate Status Protocol (OCSP) URI. OSCP is used for checking the validity of the certificate. The OCSP responder is a remote independent entity (certificate vendor authority). If you do not provide the OCSP URI, the URI in the user certificate is used.
Click Save.
- To the right of CA certificates click Add.
You can upload a CA certificate or a chain certificate. The leaf certificate can be created directly from root certificate or from an intermediate certificate. Chain certificate is a concatenation of root and intermediate certificate.
- Click Browse to select the CA certificate or drag and drop the CA certificate and click Add.
Certificates must be in PEM format, with certificate file type as
.pem. Only one certificate can be added at a time. The web server is restarted after you add the certificate and the certificate is added to the web server trust store/shared/cluster_certs/cac/. The selected CA certificate is displayed under CA certificates. - Upload the client certificate to the browser's certificate store. See the browser documentation for importing client certificates.
- Add Appliance administrator user role to a smart card user. To add the Appliance administrator role to an AD, LDAP, or a local user, navigate to Settings > User management.
- To log on using the smart card, when you enter the URL for the UI, you are prompted to select the certificate that you added to the browser trust store. Select the certificate to authenticate. Selecting the certificate is a one-time activity. You can now use the Sign in with certificate or smart card option to sign in to the UI.
To authenticate users with a certificate or smart card for a cluster where both the primary server and media servers are deployed:
- Use a user account with both Appliance Administrator and NetBackup Administrator role to log in to the NetBackup Flex Scale web interface
https://ManagementServerIPorFQDN/webuiwhere ManagementServerIPorFQDN is the public IP address, the FQDN, or the short host name that you specified for the NetBackup Flex Scale management server during the cluster configuration. - At the top right, click Settings > Smart card authentication and follow the steps mentioned in the "Configuring authentication options" section of the NetBackup™ Web UI Administrator's Guide. After configuring smart card authentication, you need to perform additional steps before you can log in using a smart card.
- Get the NetBackup Flex Scale web UI's root CA and intermediate certificates and upload it to browser:
Navigate to Cluster Management > Cluster settings > Security > Certificates and click Download root certificate.
The downloaded certificate contains two certificate keys in a single file. Separate the downloaded certificate in two files:
root_ca.pem: Upload to the browser's trusted root certificate store.stem_ca.pem: Upload to the browser's intermediate certificate store.
- Get NetBackup web root CA certificates and upload it to the browser. To get the NetBackup web certificate:
Get the NetBackup web root CA certificate using swagger or using CURL API:
curl -X 'GET' \'https://primary-server-FQDN/netbackup/security/cacert' \ -H 'accept: application/vnd.netbackup+json;version=9.0'
Copy the web root certificate from the received response to a file. Ensure that you replace the \n character with newline.
Upload the web root CA certificate to update the SAN entries in the NetBackup web certificate.
If you use Mozilla Firefox browser, enable network.cors_preflight.allow_client_cert to set it to true.
- Log in to the NetBackup Flex Scale UI by clicking Sign in with certificate or smart card on login screen and when prompted select the certificate that you uploaded to the browser trust store.