Dell believes the information in this publication is accurate as of its publication date. The information is subject to change without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS-IS.” DELL MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND
WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. USE, COPYING, AND DISTRIBUTION OF ANY DELL SOFTWARE DESCRIBED
IN THIS PUBLICATION REQUIRES AN APPLICABLE SOFTWARE LICENSE.
Dell Technologies, Dell, EMC, Dell EMC and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property
of their respective owners. Published in the USA.
Dell EMC
Hopkinton, Massachusetts 01748-9103
1-508-435-1000 In North America 1-866-464-7381
www.DellEMC.com
Locking and unlocking the file system.............................................................. 511
Locking the file system........................................................................511
Unlocking the file system....................................................................512
Changing the encryption algorithm.....................................................512
14Dell EMC DD OS Administration Guide
Preface
As part of an effort to improve its product lines, Dell EMC periodically releases revisions of its
software and hardware. Therefore, some functions described in this document might not be
supported by all versions of the software or hardware currently in use. The product release notes
provide the most up-to-date information on product features, software updates, software
compatibility guides, and information about this product, licensing, and service.
Contact your technical support professional if a product does not function properly or does not
function as described in this document.
Note: This document was accurate at publication time. Go to Online Support (https://
support.emc.com) to ensure that you are using the latest version of this document.
Purpose
This guide explains how to manage the PowerProtect DD Series Appliance systems with an
emphasis on procedures using the dd System Manager, a browser-based graphical user interface
(GUI). If an important administrative task is not supported in DD System Manager, the Command
Line Interface (CLI) commands are described.
Note:
l
DD System Manager was formerly known as the Enterprise Manager.
l
In some cases, a CLI command may offer more options than those offered by the
corresponding DD System Manager feature. See the
Operating System Command Reference Guide
for a complete description of a command and
PowerProtect DD Series Appliances
its options.
Audience
This guide is for system administrators who are familiar with standard backup software packages
and general backup administration.
Related documentation
Additional DD OS documentation is available from: https://www.dell.com/support/
This document uses the following conventions for special notices:
NOTICE
A notice identifies content that warns of a potential business or data loss.
Note: A note identifies information that is incidental, but not essential, to the topic. Notes can
provide an explanation, a comment, reinforcement of a point in the text, or just a related point.
Typographical conventions
This document uses the following type style conventions in this document:
Typography
Table 1
BoldIndicates interface element names, such as names of windows, dialog
boxes, buttons, fields, tab names, key names, and menu paths (what
the user specifically selects or clicks)
Dell EMC DD OS Administration Guide15
Preface
Table 1 Typography (continued)
Italic
Monospace
Monospace italic
Highlights publication titles listed in text
Indicates system information, such as:
l
System code
l
System output, such as an error message or script
l
Pathnames, filenames, prompts, and syntax
l
Commands and options
Highlights a variable name that must be replaced with a variable
value
Monospace bold
Indicates text for user input
[ ]Square brackets enclose optional values
|Vertical bar indicates alternate selections—the bar means “or”
{ }Braces enclose content that the user must specify, such as x or y or
z
...Ellipses indicate nonessential information omitted from the example
Where to get help
You can get support, product, and licensing information as follows:
Product information
For documentation, release notes, software updates, or information about this product, go to
Online Support at https://support.emc.com.
Technical support
Go to Online Support and click Service Center. You will see several options for contacting
Technical Support. Note that to open a service request, you must have a valid support
agreement. Contact your sales representative for details about obtaining a valid support
agreement or with questions about your account.
Your comments
Your suggestions will help us continue to improve the accuracy, organization, and overall quality of
the user publications. Send your opinions of this document to: DPAD.Doc.Feedback@emc.com.
The revision history lists the major changes to this document to support DD OS Release 7.0.
Table 2 Document revision history
RevisionDateDescription
02 (7.0.0) March 2020This revision includes the following corrections and
clarifications:
l
Corrected DD6900 and DD9400 MTree limits.
l
CAC/PIV card login
l
Removed an unsupported US location for configuring
a cloud unit for Google.
l
Add the CLI steps to register the system with an
ESRS gateway.
l
Added additional information about snapshot
retention after breaking an MTree replication
context.
l
Added additional information about licensing
requirements for storage migration.
01 (7.0.0) September 2019This revision includes information about these new
System overview
Data Domain and PowerProtect systems are disk-based inline deduplication appliances that
provide data protection and disaster recovery (DR) in the enterprise environment.
Note:
In this guide, "the protection system" or simply "the system" refers to both Data Domain
and PowerProtect DD systems running DD OS 7.0 or later.
All protection systems run the DD OS, which provides both a command-line interface (CLI) for
performing all system operations, and the DD System Manager graphical user interface (GUI) for
configuration, management, and monitoring.
Note:
DD System Manager was formerly known as the Enterprise Manager.
Protection systems consist of appliances that vary in storage capacity and data throughput.
Systems are typically configured with expansion enclosures that add storage space.
features:
l
Retention Lock Compliance for DD6900, DD9400,
and DD9900 systems.
l
GUI support for system coredump management.
18Dell EMC DD OS Administration Guide
System features
System features ensure data integrity, reliable restoration, efficient resource usage, and ease of
management. Licensed features enable you to scale the system feature set to match your needs
and budget.
Data integrity
The DD OS Data Invulnerability Architecture™ protects against data loss from hardware and
software failures.
l
When writing to disk, the DD OS creates and stores checksums and self-describing metadata
for all data received. After writing the data to disk, the DD OS then recomputes and verifies
the checksums and metadata.
l
An append-only write policy guards against overwriting valid data.
l
After a backup completes, a validation process examines what was written to disk and verifies
that all file segments are logically correct within the file system and that the data is identical
before and after writing to disk.
l
In the background, the online verify operation continuously checks that data on the disks is
correct and unchanged since the earlier validation process.
l
Storage in most systems is set up in a double parity RAID 6 configuration (two parity drives).
Additionally, most configurations include a hot spare in each enclosure. Each parity stripe uses
block checksums to ensure that data is correct. Checksums are constantly used during the
online verify operation and while data is read from the system. With double parity, the system
can fix simultaneous errors on as many as two disks.
l
To keep data synchronized during a hardware or power failure, the system uses non-volatile
RAM (NVRAM) to track outstanding I/O operations. The following system models write the
contesnts of the NVRAM to flash memory upon power failure or reboot to preserve that data
indefinitely:
n
DD6300
n
DD6800
n
DD6900
n
DD9300
n
DD9400
n
DD9500
n
DD9800
n
DD9900
l
When reading data back on a restore operation, the DD OS uses multiple layers of consistency
checks to verify that restored data is correct.
l
When writing to SSD cache, the DD OS:
n
Creates an SL checksum for every record stored in the cache to detect corruption to cache
data. This checksum is validated for every cache read.
n
Treats corruption to cache data as a cache miss to avoid data loss by forcing clients to
retrieve the most recent copy of the data from a different backup mechanism such as
NVRAM or HDD instead of retrieving the corrupted data from the cache.
System Features and Integration
Dell EMC DD OS Administration Guide19
System Features and Integration
n
n
Data deduplication
The file system deduplicates data by identifying redundant data during each backup and storing
unique data just once.
The storage of unique data is invisible to backup software and independent of data format. Data
can be structured, such as databases, or unstructured, such as text files. Data can derive from file
systems or from raw volumes.
Typical deduplication ratios are 20-to-1, on average, over many weeks. This ratio assumes there
are weekly full backups and daily incremental backups. A backup that includes many duplicate or
similar files (files copied several times with minor changes) benefits the most from deduplication.
Depending on backup volume, size, retention period, and rate of change, the amount of
deduplication can vary. The best deduplication happens with backup volume sizes of at least
10 MiB (MiB is the base 2 equivalent of MB).
To take full advantage of multiple systems, a site with more than one system must consistently
backup the same client system or set of data to the same target system. For example, if a full back
up of all sales data goes to target system A, maximum deduplication is achieved when the
incremental backups and future full backups for sales data also go to target system A.
Removes the need for inline verification of cache writes because end-to-end verification is
performed on the copy of the data that resides on the system HDDs. This also saves I/O
bandwidth by eliminating the need to perform additional I/O operations on the SSDs.
Removes the need for continuous fault detection on the SSDs because the SSDs have a
built-in scan capability.
Restore operations
File restore operations create little or no contention with backup or other restore operations.
Incremental backups to the system are superior to tape backups, because they are always reliable
and can be easily accessed.
You can perform full backups more frequently without the penalty of storing redundant data.
Multiple processes can access the system simultaneously. The system enables your site to offer
safe, user-driven, single-file restore operations.
DD Replicator
DD Replicator sets up and manages the replication of backup data between two protection
systems.
A DD Replicator pair consists of a source and a destination system and replicates a complete data
set or directory from the source system to the destination system. An individual system can be a
part of multiple replication pairs and can serve as a source for one or more pairs and a destination
for one or more pairs. After replication is started, the source system automatically sends any new
backup data to the destination system.
Multipath and load balancing
In a Fibre Channel multipath configuration, multiple paths are established between a protection
system and a backup server or backup destination array. When multiple paths are present, the
system automatically balances the backup load between the available paths.
At least two HBA ports are required to create a multipath configuration. When connected to a
backup server, each of the HBA ports on the multipath is connected to a separate port on the
backup server.
20Dell EMC DD OS Administration Guide
High Availability
The High Availability (HA) feature lets you configure two protection systems as an Active-Standby
pair, providing redundancy in the event of a system failure. HA keeps the active and standby
systems in sync, so that if the active node were to fail due to hardware or software issues, the
standby node can take over services and continue where the failing node left off.
The HA feature:
l
l
l
l
l
l
l
l
l
l
l
HA is supported on the following systems:
l
l
l
l
l
l
l
System Features and Integration
Supports failover of backup, restore, replication and management services in a two-node
system. Automatic failover requires no user intervention.
Provides a fully redundant design with no single point of failure within the system when
configured as recommended.
Provides an Active-Standby system with no loss of performance on failover.
Provides failover within 10 minutes for most operations. CIFS, DD VTL, and NDMP must be
restarted manually.
Note: Recovery of DD Boost applications may take longer than 10 minutes, because Boost
application recovery cannot begin until the DD server failover is complete. In addition,
Boost application recovery cannot start until the application invokes the Boost library.
Similarly, NFS may require additional time to recover.
Supports ease of management and configuration through DD OS CLI commands.
Provides alerts for malfunctioning hardware.
Preserves single-node performance and scalability within an HA configuration.
Note:
The active node continues retains full functionality, performance, and scalability
even if the HA configuration is in degraded mode, which means the standby node is
unavailable for failover.
Supports the same feature set as stand-alone DD systems, with the exception of vDisk.
Supports systems with all SAS drives. This includes legacy systems upgraded to systems with
all SAS drives.
Note:
The Hardware Overview and Installation Guides for the systems that support HA
describes how to install a new HA system. The
Single Node to HA Upgrade
describes how to
upgrade an existing system to an HA pair.
Does not impact the ability to scale the product.
Supports nondisruptive software updates.
Data Domain DD6800
Power Protect DD6900
Data Domain DD9300
Power Protect DD9400
Data Domain DD9500
Data Domain DD9800
Power Protect DD9900
Dell EMC DD OS Administration Guide21
System Features and Integration
HA architecture
HA functionality is available for both IP and FC connections. Both nodes must have access to the
same IP networks, FC SANs, and hosts in order to achieve high availability for the environment.
Over IP networks, HA uses a floating IP address to provide data access to the active node of the
HA pair, regardless of which physical node is the active node.
Over FC SANs, HA uses NPIV to move the FC WWNs between nodes, allowing the FC initiators to
re-establish connections after a failover.
Figure 1 on page 22 shows the HA architecture.
Figure 1 HA architecture
Random I/O handling
The random I/O optimizations included in DD OS provide improved performance for applications
and use cases that generate larger amounts of random read and write operations than sequential
read and write operations.
DD OS is optimized to handle workloads that consist of random read and write operations, such as
virtual machine instant access and instant restore, and incremental forever backups generated by
applications such as Avamar. These optimizations:
l
Improve random read and random write latencies.
l
Improve user IOPS with smaller read sizes.
l
Support concurrent I/O operations within a single stream.
l
Provide peak read and write throughput with smaller streams.
Note:
The maximum random I/O stream count is limited to the maximum restore stream
count of a protection system.
22Dell EMC DD OS Administration Guide
The random I/O enhancements allow the protection system to support instant access/instant
restore functionality for backup applications such as Avamar and Networker.
System administrator access
System administrators can access the system for configuration and management using a command
line interface (CLI) or a graphical user interface (GUI).
l
DD OS CLI - A command-line interface that is available through a serial console or through
Ethernet connections using SSH or Telnet. CLI commands enable initial system configuration,
changes to individual system settings, and display of system operation status.
l
DD System Manager - A browser-based graphical user interface that is available through
Ethernet connections. Use DD System Manager to perform initial system configuration, modify
the system configuration, display system and component status, and generate reports and
charts.
Note: Some DD hardware models support access using a keyboard and monitor attached
directly to the system.
Licensed features
Feature licenses allow you to purchase only those features you intend to use. Some examples of
features that require licenses are DD Boost, and capacity on demand (storage capacity increases).
Consult with your sales representative for information on purchasing licensed features.
System Features and Integration
Table 3
Features requiring licenses
Feature NameLicense Name in
Software
DD ArchiveStoreARCHIVESTORELicenses systems for archive use, such as file and
DD BoostDDBOOSTEnables the use of a system with qualified backup
DD Capacity on
Demand
Cloud TierCLOUDTIER-
DD EncryptionENCRYPTIONAllows data on system drives or external storage
CONTROLLERCOD
CAPACITY
Description
email archiving, file tiering, and content and
database archiving.
software. The online compatibility guide available
at https://compatibilityguide.emc.com:8080/
CompGuideApp/ provides the list of qualified
applications. The managed file replication (MFR)
feature of DD Boost also requires the DD
Replicator license.
Enables an on-demand capacity increase for a DD
system that is not at its maximum supported
capacity.
Enables a system to move data from the active
tier to low-cost, high-capacity object storage in
the public, private, or hybrid cloud for long-term
retention.
to be encrypted while being saved and locked
when moving the system to another location.
DD Expansion Storage EXPANDED-
STORAGE
Allows system storage to be expanded beyond
the level provided in the base system.
Dell EMC DD OS Administration Guide23
System Features and Integration
Table 3 Features requiring licenses (continued)
Feature NameLicense Name in
Software
DD I/OS (for IBM i
operating
environments)
DD ReplicatorREPLICATIONAdds DD Replicator for replication of data from
DD Retention Lock
Compliance Edition
DD Retention Lock
Governance Edition
DD Shelf CapacityActive Tier
DD Storage Migration STORAGE-
I/OSAn I/OS license is required when DD VTL is used
RETENTIONLOCKCOMPLIANCE
RETENTIONLOCKGOVERNANCE
CAPACITYACTIVE
MIGRATION-FORDATADOMAINSYSTEMS
Description
to backup systems in the IBM i operating
environment. Apply this license before adding
virtual tape drives to libraries.
one protection system to another. A license is
required on each system.
Meets the strictest data retention requirements
from regulatory standards such as SEC17a-4.
Protects selected files from modification and
deletion before a specified retention period
expires.
Enables a system to expand the active tier
storage capacity to an additional enclosure or a
disk pack within an enclosure.
Enables migration of data from one enclosure to
another to support replacement of older, lowercapacity enclosures.
DD Virtual Tape
Library (DD VTL)
High AvailabilityHA-ACTIVE-
SSD CacheSSD-CAPACITYEnables the SSD cache feature on DD6300,
VTLEnables the use of a protection system as a
virtual tape library over a Fibre Channel network.
This license also enables the NDMP Tape Server
feature, which previously required a separate
license.
Enables the High Availability feature in an Active-
PASSIVE
Standby configuration. You only need to purchase
one HA license; the license runs on the active
node and is mirrored to the standby node.
DD6800, DD9300, DD9500, and DD9800
systems. This license is not required to use the
SSD cache feature on DD6900, DD9400, and
DD9900 systems.
Storage environment integration
Protection systems integrate easily into existing data centers.
l
All protection systems can be configured as storage destinations for leading backup and
archiving applications using NFS, CIFS, DD Boost, or DD VTL protocols.
l
Search for
applications that work with the different configurations.
l
Multiple backup servers can share a single protection system.
compatibility documents
at https://support.emc.com for information on the
24Dell EMC DD OS Administration Guide
System Features and Integration
l
A single protection system can handle multiple simultaneous backup and restore operations.
l
Multiple protection systems can be connected to one or more backup servers.
For use as a backup destination, a protection system can be configured either as a disk storage
unit with a file system that is accessed through an Ethernet connection or as a virtual tape library
that is accessed through a Fibre Channel connection. The DD VTL feature enables protection
systems to be integrated into environments where backup software is already configured for tape
backups to minimize disruption.
Configuration is performed both in the DD OS, as described in the relevant sections of this guide,
and in the backup application, as described in the backup application’s administrator guides and in
application-related guides and tech notes.
All backup applications can access the protection system as either an NFS or a CIFS file system on
the disk device.
The following figure shows a protection system integrated into an existing basic backup
configuration.
Figure 2 Protection system integrated into a storage environment
1. Primary storage
2. Ethernet
3. Backup server
4. SCSI/Fibre Channel
5. Ethernet or Fibre Channel connection
6. Tape system
Dell EMC DD OS Administration Guide25
System Features and Integration
Figure 2 Protection system integrated into a storage environment (continued)
As shown in Figure 2 on page 25, data flows to the protection system through an Ethernet or Fibre
Channel connection. Immediately, the data verification processes begin and are continued while
the data resides on the system. In the file system, the DD OS Global Compression algorithms
deduplicate and compress the data for storage. Data is then sent to the disk RAID subsystem.
When a restore operation is required, data is retrieved from storage, decompressed, verified for
consistency, and transferred via Ethernet to the backup servers using Ethernet (for NFS, CIFS,
DD Boost), or using Fiber Channel (for DD VTL and DD Boost).
The DD OS accommodates relatively large streams of sequential data from backup software and is
optimized for high throughput, continuous data verification, and high compression. It also
accommodates the large numbers of smaller files in nearline storage (DD ArchiveStore).
Protection system performance is best when storing data from applications that are not
specifically backup software under the following circumstances.
l
Data is sent to the protection system as sequential writes (no overwrites).
l
Data is neither compressed nor encrypted before being sent to the protection system.
7. Protection system
8. DD OS management layer
9. NFS export/CIFS share/DD VTL pool/DD Boost storage unit
10. DD OS data verification
11. DD OS file system
12. DD OS global deduplication and compression
13. DD OS RAID protection
26Dell EMC DD OS Administration Guide
CHAPTER 2
Getting Started
This chapter includes:
l
Dell EMC DD System Manager overview............................................................................... 28
l
Logging in and out of DD System Manager............................................................................28
l
The DD System Manager interface........................................................................................ 31
l
Configuring the system with the configuration wizard...........................................................34
Command line interface.........................................................................................................47
l
Logging into the CLI.............................................................................................................. 47
l
CLI online help guidelines...................................................................................................... 48
Dell EMC DD OS Administration Guide
27
Getting Started
Dell EMC DD System Manager overview
DD System Manager is a browser-based GUI for managing a single system from any location. DD
System Manager provides a single, consolidated management interface that enables you to
configure and monitor many of the system features and settings.
Note: PowerProtect DD Management Center (DDMC) enables you to manage multiple
systems from a single browser window.
DD System Manager provides real-time graphs and tables that enable you to monitor the status of
system hardware components and configured features.
Additionally, a command set that performs all system functions is available to users through the
CLI. Commands configure system settings and display system hardware status, feature
configuration, and operation.
The command-line interface is available through a serial console or through an Ethernet
connection using SSH, Telnet, or serial over LAN (SOL).
Note: Some systems support access using a keyboard and monitor attached directly to the
system.
DD OS Software Versions
DD OS software releases have two public statuses, indicating the number of installed systems
running the version.
l
General Availability releases have completed internal QA Testing and are available for
installation in production environments.
l
Directed Availability - Controlled (Directed Availability) releases are carefully controlled
access releases, directed to a small number of installations. Customers may request to be
qualified for access to these releases.
l
Target Code -Dell EMC recommends that all systems upgrade to the DD OS target code
within a release family as soon as practical.
Note:
There is only one Target Code release in a given family. Target Code releases have
met the installation and run-time hours and quality metrics to indicate that they are stable
and have no problems that would affect most customers. For some release families, there
may be no target code identified, due to limited customer uptake, quality issues, or other
considerations.
Upgrading between families may have product compatibility considerations, and a careful review of
product compatibility should precede any upgrade to a new release family.
Logging in and out of DD System Manager
DD System Manager provides a single, consolidated management interface that enables you to
configure and monitor many of the system features and settings Use a browser to log in to DD
System Manager.
About this task
When connecting to DD System Manager from a web browser, all HTTP connections automatically
redirect to HTTPS.
Note:
For information about managing user permissions, see the KB article
Permissions on the Data Domain system
support.emc.com/kb/181533.
28Dell EMC DD OS Administration Guide
Managing User
, available from the Online Support website, at https://
Procedure
1. Open a web browser and enter the IP address or hostname to connect to DD System
Manager. It must be one of the following:
l
A fully qualified domain name (for example, http://dd01.example.com)
l
A hostname (http://dd01)
l
An IP address (http://10.5.50.5)
Note: DD System Manager uses HTTP port 80 and HTTPS port 443. If your system is
behind a firewall, you may need to enable port 80 if using HTTP, or port 443 if using
HTTPS to reach the system. The port numbers can be easily changed if security
requirements dictate.
Note: If DD System Manager is unable to launch from any web browser, the displayed
error message is "The GUI Service is temporarily unavailable. Please refresh your
browser. If the problem persists, contact support for assistance." SSH can be used to
login to the system and can run all commands.
If you have not upgraded the DD OS but still encounter this GUI error, use the following
procedure:
a. Close the web browser session on the system with the reported error.
Getting Started
b. Run these commands in sequence:
l
adminaccess disable http
l
adminaccess disable https
l
adminaccess enable http
l
adminaccess enable https
c. Wait 5 minutes to allow the http and https services to start completely.
d. Open a web browser, and connect to DD System Manager.
If you see this GUI issue after a DD OS upgrade, use the following procedure:
a. Close the web browser session on the system with the reported error.
b. Run these commands in sequence:
l
adminaccess disable http
l
adminaccess disable https
l
adminaccess certificate generate self-signed-cert
l
adminaccess enable http
l
adminaccess enable https
a. Wait 5 minutes to allow the http and https services to start completely.
b. Open a web browser, and connect to DD System Manager.
2. For HTTPS secure login, click Secure Login.
Secure login with HTTPS requires a digital certificate to validate the identity of the DD OS
system and to support bi-directional encryption between DD System Manager and a
browser. DD OS includes a self-signed certificate, and DD OS allows you to import your own
certificate.
3. Enter your assigned username and password.
Dell EMC DD OS Administration Guide29
Getting Started
l
For physical systems the default password is the system serial number.
l
For PowerProtect DD Virtual Edition (DD VE) instances the default password is
changeme.
4. Click Log In.
If this is the first time you have logged in, the Home view is displayed in the Information
panel.
Note: If you enter an incorrect password 4 consecutive times, the system locks out the
specified username for 120 seconds. The login count and lockout period are configurable
and might be different on your system.
Note: If this is the first time you are logging in, you might be required to change your
password. If the system administrator has configured your username to require a
password change, you must change the password before gaining access to DD System
Manager.
If you forget the sysadmin password after changing it, contact Dell EMC Support.
5. To log out, click the log out button in the DD System Manager banner.
When you log out, the system displays the log in page with a message that your log out is
complete.
Log in with certificate using CAC/PIV card
Log in to DD System Manager with a certificate issued by a Certificate Authority (CA).
Before you begin
l
You must have authorization privileges on the protection system, and the protection system
must trust the CA certificate. Your username must be specified in the common-name field in
the certificate.
l
You must have a user account on the protection system. You can be either a local user or a
name service user (NIS/AD). For a name service user, your group-to-role mapping must be
configured on the protection system.
Procedure
1. Use the following CLI command to import the public key from the CA that issued the
certificate: adminaccess certificate import ca application login-auth.
2. Load the user certificate in PKCS12 format in your browser from the CAC/PIV card after
swiping CAC/PIV card against a card reader which interacts with the browser .
Once the CA certificate is trusted by the protection system, a Log in with certificate link is
visible on the HTTPS login screen.
3. Click Log in with certificate, and choose the user certificate from the list of certificates
that are prompted by the browser.
Results
The system validates the user certificate against the trust store. Based on authorization privileges
associated with your account, a System Manager session is created for you.
30Dell EMC DD OS Administration Guide
Loading...
+ 482 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.