NetBackup™ Web UI Administrator's Guide
- Introducing the NetBackup web user interface
 - Monitoring NetBackup
 - Notifications
 - Section I. Managing role-based access control
- About role-based access control in NetBackup
 - Configuring RBAC roles
- Configuring RBAC
 - Default RBAC roles
- Administrator
 - Default AHV Administrator
 - Default Cloud Administrator
 - Default Kubernetes Administrator
 - Default NetBackup Kubernetes Operator Service
 - Default RHV Administrator
 - Default Resiliency Administrator
 - Default Microsoft SQL Server Administrator
 - Default Security Administrator
 - Default Storage Administrator
 - Default VMware Administrator
 
 
 - RBAC permissions
- About role permissions
 - Global > NetBackup management
- NetBackup Web Management Console Administration
 - Access hosts
 - Agentless hosts
 - Anomalies
 - Data classifications
 - Email notifications
 - Event logs
 - NetBackup hosts
 - Image sharing
 - NetBackup backup images
 - Jobs
 - Licensing
 - Media server
 - Remote primary server certificate authority
 - Resiliency
 - Resource limits
 - Retention levels
 - Servers > Trusted primary servers
 - Cloud providers
 - CloudPoint servers
 - WebSocket servers
 
 - Global > Protection
 - Global > Security
 - Global > Storage
 - Assets
 - Protection plans
 - Credentials
 - Manage access
 
 
 - Section II. Managing security
- Security events and audit logs
 - Managing security certificates
 - Managing user sessions
 - Managing master server security settings
- Certificate authority for secure communication
 - Disable communication with NetBackup 8.0 and earlier hosts
 - Disable automatic mapping of NetBackup host names
 - About NetBackup certificate deployment security levels
 - Select a security level for NetBackup certificate deployment
 - Set a passphrase for disaster recovery
 - About trusted primary servers
 
 - Creating and managing API keys for users (Administrators)
 - Adding and managing your API key (Users)
 - Configuring authentication options
 - Managing hosts
 
 - Section III. Managing storage and backups
- Configuring storage
- About storage configuration
 - Create a Media Server Deduplication Pool (MSDP) storage server
 - Create a Cloud storage, OpenStorage, or AdvancedDisk storage server
 - Create a disk pool
 - Create a storage unit
 - Create a universal share
 - Using image sharing from the NetBackup web UI
 - Troubleshooting storage configuration
 - Troubleshooting universal share configuration issues
 - Create a Media Server Deduplication Pool (MSDP) storage server for image sharing
 
 - Managing protection plans
 - Managing classic policies
 - Usage reporting and capacity licensing
 
 - Configuring storage
 - Section IV. Veritas Resiliency Platform
 - Section V. Credentials
 - Troubleshooting the NetBackup Web UI
 
Notes for using NetBackup RBAC
Note the following when you configure the permissions for RBAC roles:
RBAC only controls access to the web UI and not the NetBackup Administration Console.
When you create roles, be sure to enable the minimal number of permissions so the user can sign in to and use the web UI. Some individual permissions do not have a direct correlation with a screen in the web UI. Users that attempt to sign in but that only have a permission of this kind receive an "Unauthorized" message.
If a user is added to or removed from a role, the user must sign out and sign in again before the user's permissions are updated.
Most permissions are not implicit.
In most cases a permission does not give a user permission. A permission does not give a user permission or other recovery options like .
Not all RBAC-controlled operations can be used from the NetBackup web UI. (For example, NetBackup backup images can only be viewed and managed from the APIs or the NetBackup Administration Console.) These types of operations are included in RBAC so a role administrator can create roles for API users as well as web UI users.
Some tasks require a user to have permissions in multiple RBAC categories. For example, to establish a trust relationship with a remote primary server, a user must have permissions for both and .