Veritas NetBackup™ 8.0 Security and Encryption Guide
- Increasing NetBackup security
- Security deployment models
- Port security
- About NetBackup daemons, ports, and communication
- Additional port information for products that interoperate with NetBackup
- About configuring ports
- Auditing NetBackup operations
- Configuring Enhanced Auditing
- Access control security
- NetBackup Access Control Security (NBAC)
- Configuring NetBackup Access Control (NBAC)
- Configuring Access Control host properties for the master and media server
- Access Control host properties dialog for the client
- Troubleshooting Access Management
- Windows verification points
- UNIX verification points
- Verification points in a mixed environment with a UNIX master server
- Verification points in a mixed environment with a Windows master server
- About determining who can access NetBackup
- Viewing specific user permissions for NetBackup user groups
- Security certificates in NetBackup
- Overview of security certificates in NetBackup
- About the Security Management utilities
- About host name-based certificates
- About host ID-based certificates
- Using the Certificate Management utility to issue and deploy host ID-based certificates
- About certificate deployment security levels
- Setting up trust with the master server (Certificate Authority)
- About reissuing host ID-based certificates
- About Token Management for host ID-based certificates
- About revoking host ID-based certificates
- Security certificate deployment in a clustered NetBackup setup
- About deployment of a host ID-based certificate on a clustered NetBackup host
- About deploying a new host ID-based certificate
- Data at rest encryption security
- About NetBackup client encryption
- Configuring standard encryption on clients
- About configuring standard encryption from the server
- Configuring legacy encryption on clients
- About configuring legacy encryption from the client
- About configuring legacy encryption from the server
- Additional legacy key file security for UNIX clients
- Data at rest key management
- About the Key Management Service (KMS)
- Installing KMS
- Configuring KMS
- About key groups and key records
- Overview of key record states
- Configuring NetBackup to work with KMS
- About using KMS for encryption
- KMS database constituents
- Command line interface (CLI) commands
- About exporting and importing keys from the KMS database
- Troubleshooting KMS
Creating a reissue token
A host ID-based certificate can be reissued if the non-master host is already registered with the master server but its host ID-based certificate is no longer valid. For example, a certificate is not valid when it has expired, is revoked, or is lost.
A reissue token is a type of token that can be used to reissue a certificate. It is a special type of token because it retains the same host ID as the original certificate. Since a reissue token is bound to a specific host, the token cannot be used to request certificates for additional hosts.
To create a reissue a token using the NetBackup Administration Console
- In the NetBackup Administration Console, expand Security Management > Certificate Management.
- In the right pane, select the host that requires a reissue token.
- From the Actions menu, select Generate Reissue Token.
- In the Create Reissue Token dialog, enter a name for the token.
- Select a date for token validity from the Valid until option.
- In the Reason field, enter a reason for the reissue token. The reason appears in the log as an audit event.
- Click Create.
- The reissue token appears in a dialog. Select Copy to save the token value to the clipboard.
- Convey the token value to the administrator of the non-master host. How the token is conveyed depends on various security factors in the environment. The token may be transmitted by email, by file, or verbally.
The administrator of the non-master host deploys the token to obtain another host ID-based certificate. See the following topic for instructions:
To create a reissue a token using the nbcertcmd command
- The master server administrator must be logged in to the NetBackup Web Management Service to perform this task. Use the following command to login:
bpnbat -login -logintype WEB
- Run one of the following commands on the master server.
Use the host name for which the certificate needs to be reissued:
nbcertcmd - createToken -name token_name -reissue -host host_name
Use the host ID for which the certificate needs to be reissued:
nbcertcmd - createToken -name token_name -reissue -hostId host_id
Additional parameters can be used to indicate validity duration and the reason for creation.
In addition to reissuing a token, the following steps are required to request a certificate for a renamed NetBackup host.
To request a certificate for a host after a host name change
- The NetBackup administrator of the master server generates a reissued token for the renamed NetBackup host.
- The NetBackup administrator must revoke the host ID-based certificate for the renamed host.
See Revoking a host ID-based certificate.
Note:
After the certificate is revoked, the host is unable to communicate with the NetBackup Web Management Console service (nbwmc). When the host obtains a new certificate using the reissued token, the host can communicate with nbwmc again.
- After the certificate is revoked, the administrator of the non-master host must use the reissued token to get a certificate for the renamed host.