NetBackup™ Web UI Administrator's Guide
- Introducing the NetBackup web user interface
 - Monitoring and notifications
 - Section I. Configuring hosts
 - Section II. Configuring storage and backups
- Configuring storage
- About storage configuration
 - Create a Media Server Deduplication Pool (MSDP) storage server
 - Create a Cloud storage, OpenStorage, or AdvancedDisk storage server
 - Create a disk pool
 - Create a storage unit
 - Create a universal share
 - Using image sharing from the NetBackup web UI
 - Troubleshooting storage configuration
 - Troubleshooting universal share configuration issues
 - Create a Media Server Deduplication Pool (MSDP) storage server for image sharing
 
 - Managing protection plans
 - Managing classic policies
 - Managing backup images
 
 - Configuring storage
 - Section III. Managing credentials
- Managing credentials for workloads and systems that NetBackup accesses
- About credential management in NetBackup
 - Add a credential in NetBackup
 - Add a credential for an external KMS
 - Add a credential for NetBackup Callhome Proxy
 - Edit or delete a named credential
 - Add a credential for Network Data Management Protocol (NDMP)
 - Edit or delete Network Data Management Protocol (NDMP) credentials in NetBackup
 
 
 - Managing credentials for workloads and systems that NetBackup accesses
 - Section IV. Managing security
- Security events and audit logs
 - Managing security certificates
 - Managing host mappings
 - Managing user sessions
 - Managing the security settings for the primary server
- Certificate authority for secure communication
 - Disable communication with NetBackup 8.0 and earlier hosts
 - Disable automatic mapping of NetBackup host names
 - Configure the global data-in-transit encryption setting
 - About NetBackup certificate deployment security levels
 - Select a security level for NetBackup certificate deployment
 - Set a passphrase for disaster recovery
 - About trusted primary servers
 
 - Access keys
 - Configuring authentication options
 
 - Section V. Managing role-based access control
- About role-based access control in NetBackup
 - Configuring RBAC roles
- Configuring RBAC
- Notes for using NetBackup RBAC
 - Add AD or LDAP domains
 - Add a custom RBAC role
 - Edit or remove a role a custom role
 - View users in RBAC
 - Add a user to a role (non-SAML)
 - Add a user to a role (non-SAML, smart card user without AD or LDAP domain association or mapping)
 - Add a user to a role (SAML)
 - Remove a user from a role
 
 - Default RBAC roles
- Administrator
 - Default AHV Administrator
 - Default Cloud Administrator
 - Default NetBackup Command Line (CLI) Administrator
 - Default Kubernetes Administrator
 - Default NetBackup Kubernetes Operator Service
 - Default Microsoft SQL Server Administrator
 - Default Oracle Administrator
 - Default RHV Administrator
 - Default SaaS Administrator
 - Default Resiliency Administrator
 - Default Security Administrator
 - Default Storage Administrator
 - Default Universal Share Administrator
 - Default VMware Administrator
 
 
 - Configuring RBAC
 - RBAC permissions
- About role permissions
 - Global > BMR
 - Global > NetBackup Web Management Console Administration
 - Global > NetBackup management
- Access hosts
 - Agentless hosts
 - Anomalies
 - CLI sessions
 - Data classifications
 - Email notifications
 - Event logs
 - NetBackup hosts
 - Image sharing
 - NetBackup backup images
 - Jobs
 - Licensing
 - Media server
 - Remote primary server certificate authority
 - Resiliency
 - Resource limits
 - Retention levels
 - Servers > Trusted primary servers
 - Cloud providers
 - CloudPoint servers
 - WebSocket servers
 
 - Global > Protection
 - Global > Security
- Access control
 - Security events
 - Certificate management
 - Disaster recovery passphrase
 - Identity provider and SAML certificate configuration
 - Key Management Services (KMS)
 - Passphrase constraints
 - Service principal configuration
 - Global security settings
 - Trust versions
 - API keys
 - User certificates
 - User sessions and authentication
 
 - Global > Storage
 - Assets
 - Protection plans
 - Credentials
 - Manage access
 
 
 - Section VI. Managing detection and reporting
 - Managing deployment
 - Managing Resiliency Platforms
 - NetBackup SaaS Protection
 - NetBackup Flex Scale
 - Managing Bare Metal Restore (BMR)
 - Troubleshooting the NetBackup Web UI
 
Managing NetBackup certificate authorization tokens
Note:
The information here only applies to the security certificates that are issued by the NetBackup certificate authority (CA). External certificates must be managed outside of NetBackup.
Depending on the security level for NetBackup certificate deployment, you may need an authorization token to issue a new NetBackup certificate to a host. You can create a token when it is required or find and copy a token if it is needed again. Tokens can be cleaned up or deleted if they are no longer needed.
To reissue a certificate, a reissue token is required in most cases. A reissue token is associated with the host ID.
Depending on the NetBackup certificate deployment security level, an authorization token may be required for a non-primary NetBackup host to obtain a host ID-based NetBackup certificate. The NetBackup administrator of the primary server generates the token and shares it with the administrator of the non-primary host. That administrator can then deploy the certificate without the presence of the primary server administrator.
Do not create an authorization token for a NetBackup host whose current certificate is not in a valid state because it is lost, corrupt, or expired. In these cases, a reissue token must be used.
See Reissue a NetBackup certificate.
To create an authorization token
- On the left, select Security > Tokens.
 - On the top left, click Add.
 - Enter the following information for the token:
Token name
The maximum number of times you want the token to be used
How long the token is valid for
 - Click Create.
 
You can view the details of the tokens that you have created and copy the token value for future use.
To find and copy an authorization token value
- On the left, select Security > Tokens.
 - Select the name of the token for which you want to view the details.
 - At the top right, click Show token and then click the Copy to clipboard icon.
 
Use the Cleanup tokens utility to delete tokens from the token database that are expired or that have reached the maximum number of uses allowed.
To cleanup tokens
- On the left, select Security > Tokens.
 - Click Cleanup > Yes.
 
You can delete a token can be deleted before it is expired or before the is reached.
To delete a token
- On the left, select Security > Tokens.
 - Select the name of the tokens that you want to delete.
 - On the top right, click Delete.