PowerProtect Data Manager
Version 19.2
Administration and User Guide
REV 03
October 2019
Copyright © 2016-2019 Dell Inc. or its subsidiaries. All rights reserved.
Dell believes the information in this publication is accurate as of its publication date. The information is subject to change without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS-IS.” DELL MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. USE, COPYING, AND DISTRIBUTION OF ANY DELL SOFTWARE DESCRIBED IN THIS PUBLICATION REQUIRES AN APPLICABLE SOFTWARE LICENSE.
Dell Technologies, Dell, EMC, Dell EMC and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property of their respective owners. Published in the USA.
Dell EMC
Hopkinton, Massachusetts 01748-9103 1-508-435-1000 In North America 1-866-464-7381 www.DellEMC.com
2 |
PowerProtect Data Manager Administration and User Guide |
Preface |
|
9 |
Chapter 1 |
Getting Started |
13 |
|
Introducing PowerProtect Data Manager software........................................... |
14 |
|
Accessing the PowerProtect Data Manager UI.................................................. |
14 |
|
Replacing the default PowerProtect Data Manager certificate ............ |
15 |
|
Getting Started.................................................................................... |
16 |
|
UI tools and options ............................................................................. |
16 |
Chapter 2 |
Managing Users |
19 |
|
Managing user roles and privileges ................................................................... |
20 |
|
Managing users.................................................................................... |
20 |
|
Default admin user............................................................................... |
22 |
|
Roles.................................................................................................... |
22 |
|
Privileges............................................................................................. |
25 |
|
Resetting system-generated VM Direct credentials.......................................... |
30 |
|
Managing LDAP or AD groups........................................................................... |
30 |
|
Managing keychains.......................................................................................... |
31 |
|
Add credentials..................................................................................... |
31 |
|
LDAP or AD authentication................................................................................ |
31 |
|
Configuring LDAP or AD authorities and assigning roles....................... |
31 |
|
Example: Configuring an AD authority ................................................. |
35 |
|
Example: Configuring an LDAP authority............................................. |
36 |
|
Troubleshooting LDAP configuration issues......................................... |
37 |
Chapter 3 |
Managing Storage |
39 |
|
Add protection storage .................................................................................... |
40 |
|
Overview of PowerProtect Data Manager cloud tier......................................... |
41 |
|
Add Data Domain cloud protection storage........................................... |
41 |
|
Overview of PowerProtect Data Manager Cloud Disaster Recovery.................. |
41 |
Chapter 4 |
Enabling the Microsoft Application Agent for SQL |
43 |
|
About the Microsoft application agent for SQL................................................. |
44 |
|
Microsoft SQL Server data protection and replication requirements................ |
44 |
|
Protecting a stand-alone SQL Server................................................................ |
44 |
|
Protecting SQL Server clustered environments................................................ |
45 |
|
Install and configure the Microsoft application agent for SQL Server............... |
46 |
|
Prerequisites ....................................................................................... |
46 |
|
Install the Microsoft application agent................................................. |
46 |
|
Upgrade the Microsoft application agent............................................. |
48 |
|
Uninstall the Microsoft application agent with the setup file................ |
48 |
|
Required privileges for backup and recovery of a stand-alone server... |
49 |
|
Required privileges for backup and recovery of an Always On availability |
|
|
group................................................................................................... |
49 |
|
Required privileges for backup and recovery of a Failover Cluster |
|
|
Instance or Always On Failover Cluster Instance.................................. |
50 |
PowerProtect Data Manager Administration and User Guide |
3 |
Contents
|
Stagger SQL discovery jobs in host scale-out environments................ |
50 |
|
Manage the Microsoft application agent for SQL............................................. |
50 |
|
Support for existing SQL agent backups with PowerProtect Data Manager...... |
51 |
|
Supporting existing SQL agent backups with PowerProtect................ |
52 |
|
Use the backup discovery tool for PowerProtect Data Manager |
|
|
management of existing backups......................................................... |
53 |
Chapter 5 |
Enabling the Oracle RMAN Agent |
55 |
|
About the Oracle RMAN agent......................................................................... |
56 |
|
Review Oracle data protection and replication requirements............................ |
56 |
|
Prerequisites........................................................................................ |
56 |
|
Protecting a stand-alone Oracle server............................................................. |
57 |
|
Protecting Oracle RAC environments............................................................... |
57 |
|
Install and configure the Oracle RMAN agent................................................... |
58 |
|
Install the Oracle RMAN agent............................................................. |
58 |
|
Upgrade the Oracle RMAN agent......................................................... |
60 |
|
Uninstall the Oracle RMAN agent........................................................ |
62 |
|
Integration with PowerProtect Data Manager software....................... |
64 |
|
Install the PowerProtect Data Manager agent..................................... |
65 |
|
Uninstall the PowerProtect Data Manager agent................................. |
67 |
|
How the Oracle RMAN agent communicates with PowerProtect Data |
|
|
Manager............................................................................................... |
67 |
|
Verify the connectivity from ddbmcon.................................................. |
71 |
|
Discover the storage units.................................................................... |
74 |
|
Add or manage the Oracle application agent..................................................... |
74 |
|
Supporting existing Oracle RMAN agent backups with PowerProtect Data |
|
|
Manager............................................................................................................ |
75 |
|
Support existing Oracle RMAN agent backups with PowerProtect Data |
|
|
Manager............................................................................................... |
76 |
Chapter 6 |
Enabling the File System Agent |
79 |
|
About the File System agent............................................................................. |
80 |
|
File System agent prerequisites........................................................................ |
80 |
|
Roadmap for protection with the File System agent.......................................... |
81 |
|
Installing and configuring File System agent..................................................... |
82 |
|
Install the File System agent on Linux.................................................. |
82 |
|
Install the File System agent on Windows ........................................... |
82 |
|
Silent installation of File System agent................................................. |
83 |
|
Uninstalling the File System agent ...................................................... |
83 |
|
Upgrade the File System agent............................................................ |
84 |
|
Manage the File System agent.......................................................................... |
84 |
Chapter 7 |
Enabling the Storage Direct Agent |
87 |
|
About the Storage Direct agent........................................................................ |
88 |
|
Storage Direct agent prerequisites................................................................... |
88 |
|
Additional setup and configuration file requirements for existing Storage Direct |
|
|
users................................................................................................................. |
89 |
|
Roadmap for protection with the Storage Direct agent (new users)................. |
91 |
|
Roadmap for protection with the Storage Direct agent (existing Storage Direct |
|
|
users)............................................................................................................... |
93 |
|
Installing or Upgrading Storage Direct.............................................................. |
94 |
|
Install the Storage Direct agent on Linux............................................. |
94 |
|
Upgrade the Storage Direct agent on Linux......................................... |
95 |
|
Install or Upgrade the Storage Direct agent on Windows .................... |
97 |
4 |
PowerProtect Data Manager Administration and User Guide |
|
|
Contents |
|
Silent installation of the Storage Direct agent...................................... |
98 |
|
Uninstall the Storage Direct agent on Linux......................................... |
98 |
|
Uninstall the Storage Direct agent on Windows................................... |
98 |
|
Manage the Storage Direct agent..................................................................... |
98 |
Chapter 8 |
Managing Assets |
101 |
|
About asset sources, assets, and storage........................................................ |
102 |
|
Prerequisites for discovering asset sources..................................................... |
102 |
|
Adding a vCenter Server asset source............................................................. |
102 |
|
Add a VMware vCenter Server........................................................... |
102 |
|
Virtual asset discovery........................................................................ |
104 |
|
Creating a dedicated vCenter user account and assigning the role in vCenter.105 |
|
|
Specify the required privileges for a dedicated vCenter user account .... |
|
|
105 |
|
|
VM Direct protection engine overview............................................................ |
108 |
|
Add a VM Direct appliance.................................................................. |
108 |
|
Additional VM Direct actions.............................................................. |
109 |
|
Discovering an application or File System host ................................................ |
110 |
|
Discover an Oracle or SQL application host......................................... |
111 |
|
Discover a File System Host................................................................. |
111 |
|
Discover a Storage Direct agent host.................................................. |
112 |
|
Add and discover the SMIS server for the Storage Direct agent...................... |
113 |
Chapter 9 |
Managing Protection Policies |
115 |
|
Protection policies........................................................................................... |
116 |
|
Policy retention time considerations................................................... |
116 |
|
Data Domain protection considerations............................................... |
116 |
|
Before you a create protection policy.............................................................. |
118 |
|
Add a protection policy for virtual machine protection..................................... |
118 |
|
On-demand backups of virtual machines............................................. |
121 |
|
Additional options for managing virtual machine backups................... |
122 |
|
Add a protection policy for SQL database protection...................................... |
122 |
|
Add a protection policy for Oracle database protection................................... |
125 |
|
Add a protection policy for File System protection.......................................... |
129 |
|
Add a protection policy for Storage Direct protection..................................... |
132 |
|
Add a Cloud Tier protection policy................................................................... |
136 |
|
Edit a protection policy.................................................................................... |
137 |
|
Add or remove assets in a protection policy..................................................... |
137 |
|
Removing expired backup copies..................................................................... |
138 |
|
Export protection ........................................................................................... |
139 |
|
Delete a protection policy................................................................................ |
139 |
|
Add a Service Level Agreement....................................................................... |
140 |
|
Export Asset Compliance................................................................................. |
142 |
|
Dynamic filters ................................................................................................ |
143 |
|
Creating virtual machine tags in the vSphere Client............................ |
143 |
|
Add a dynamic filter............................................................................ |
144 |
|
Manually run a dynamic filter.............................................................. |
145 |
|
Edit or delete a dynamic filter ............................................................ |
146 |
|
Change the priority of the existing dynamic filter .............................. |
146 |
Chapter 10 |
Restoring Data and Assets |
147 |
|
View copies..................................................................................................... |
148 |
|
Restore a virtual machine or VMDK................................................................. |
148 |
|
Prerequisites to restore a virtual machine........................................... |
149 |
PowerProtect Data Manager Administration and User Guide |
5 |
Contents
|
Restore to original virtual machine...................................................... |
149 |
|
Restore individual virtual disks............................................................ |
151 |
|
Restore to new.................................................................................... |
151 |
|
Restore an instant access virtual machine.......................................... |
153 |
|
File level restore................................................................................. |
156 |
|
Direct Restore to ESXi....................................................................... |
158 |
|
Restore an application-aware virtual machine backup..................................... |
159 |
|
Performing centralized restore of a File System host...................................... |
159 |
|
Centralized restore of File Systems in PowerProtect Data Manager.. 159 |
|
|
Restore of Storage Direct backups in PowerProtect Data Manager................. |
161 |
|
Restore the PowerProtect Data Manager server ............................................ |
162 |
|
Restore operations for cloud tier..................................................................... |
163 |
|
Restore from cloud tier....................................................................... |
163 |
Chapter 11 |
Performing Self-service Backup and Restore of Application and File |
|
|
System Agents |
165 |
|
Performing self-service backups of Microsoft SQL databases........................ |
166 |
|
Performing self-service backups of Oracle databases..................................... |
166 |
|
Performing self-service backups of File Systems............................................. |
167 |
|
Performing self-service backups of Microsoft SQL databases........................ |
168 |
|
Restore a SQL application host....................................................................... |
168 |
|
Restore an Oracle application host.................................................................. |
168 |
|
Performing self-service restore of a File System host..................................... |
169 |
|
Using the ddfsadmin utility for File Systems....................................... |
169 |
|
Self-service image-level restore of File Systems................................ |
170 |
|
Self-service file-level restore of File Systems...................................... |
171 |
Chapter 12 |
Preparing for and Recovering from a Disaster |
173 |
|
Managing system backups............................................................................... |
174 |
|
Manage PowerProtect Data Manager backups for disaster recovery.............. |
174 |
|
Prepare the Data Domain recovery target....................................................... |
175 |
|
Configure backups for disaster recovery......................................................... |
175 |
|
Configure PowerProtect Data Manager server disaster recovery backups...... |
176 |
|
Record settings for disaster recovery.............................................................. |
176 |
|
Restore PowerProtect Data Manager from an external Data Domain system.. 177 |
|
Chapter 13 |
Managing Alerts, Jobs, and Tasks |
179 |
|
Configure Alert Notifications........................................................................... |
180 |
|
View and manage System Alerts...................................................................... |
180 |
|
View and manage System Alerts...................................................................... |
181 |
|
Monitoring and viewing jobs............................................................................. |
181 |
|
Monitor and view tasks.................................................................................... |
182 |
|
Restart a job or task........................................................................................ |
182 |
|
Cancel a job or task......................................................................................... |
183 |
|
Export logs for a job or task............................................................................. |
184 |
Chapter 14 |
Upgrading the PowerProtect Data Manager Software |
185 |
|
Upgrade the software from PowerProtect Data Manager version 19.1............ |
186 |
|
Upgrade PowerProtect Data Manager from version 19.2 and later.................. |
187 |
|
Managing certificates after upgrading from versions earlier than PowerProtect |
|
|
Data Manager version 19.1............................................................................... |
188 |
6 |
PowerProtect Data Manager Administration and User Guide |
|
Contents |
|
Chapter 15 |
Best Practices and Troubleshooting |
191 |
|
Compatibility information................................................................................ |
192 |
|
Power off the PowerProtect Data Manager OVA............................................ |
192 |
|
Creating a dedicated vCenter user account and assigning the role in vCenter.192 |
|
|
Specify the required privileges for a dedicated vCenter user account .... |
|
|
192 |
|
|
Best practices with the VM Direct appliance................................................... |
195 |
|
Software and hardware requirements................................................. |
196 |
|
PowerProtect Data Manager resource requirements on VMware |
|
|
environment........................................................................................ |
197 |
|
Configuration checklist for common issues......................................... |
197 |
|
VM Direct appliance performance and scalability................................ |
198 |
|
Increasing the number of instant access sessions............................... |
199 |
|
Enabling or disabling Changed Block Tracking.................................... |
199 |
|
Configure a backup to support vSAN datastores............................... |
200 |
|
Disable SSL certification on the vCenter Server................................ |
200 |
|
Troubleshooting backup configuration issues.................................................. |
200 |
|
Troubleshooting virtual machine backup issues............................................... |
201 |
|
VM Direct limitations and unsupported features................................. |
201 |
|
Managing command execution for VM Direct Agent operations on Linux |
|
|
.......................................................................................................... |
203 |
|
SQL Server application-consistent backups fail with error "Unable to |
|
|
find VSS metadata files in directory"................................................. |
203 |
|
Failed to lock Virtual Machine for backup: Another EMC VM Direct |
|
|
operation 'Backup' is active on VM ................................................... |
203 |
|
vMotion operations are not allowed during active backup operations.203 |
|
|
Backups fail if certain characters are used in the virtual machine name, |
|
|
datastore, folder, or datacenter names.............................................. |
203 |
|
Lock placed on virtual machine during backup and recovery operations |
|
|
continues for 24 hours if VM Direct appliance fails............................ |
204 |
|
Trailing spaces not supported in SQL database names....................... |
204 |
|
SQL databases skipped during virtual machine transaction log backup.... |
|
|
204 |
|
|
Accessing Knowledge Base Articles................................................... |
205 |
|
Recover a failed PowerProtect Data Manager backup.................................... |
205 |
|
Troubleshooting virtual machine restore issues............................................... |
205 |
|
Troubleshooting instant access restore failures................................. |
207 |
|
FLR Agent for virtual machine file-level restore................................. |
208 |
|
Supported platform versions for file-level restore.............................. |
209 |
|
File-level restore and SQL restore limitations..................................... |
210 |
|
Troubleshoot recovery of PowerProtect Data Manager.................................. |
212 |
|
Application agent and File System agent co-existence.................................... |
212 |
|
Microsoft application agent for SQL Server application-aware protection...... |
214 |
|
Troubleshooting Microsoft Application Agent discoveries on Windows 2008 and |
|
|
Application Direct............................................................................................ |
216 |
|
Supporting more than 50 database clients...................................................... |
216 |
|
File System agent limitations........................................................................... |
216 |
|
Storage Direct agent limitations...................................................................... |
218 |
|
Time synchronization required between PowerProtect Data Manager and the |
|
|
systems it interfaces with................................................................................ |
221 |
|
PowerProtect Data Manager allows completion of protection policy when |
|
|
storage unit on the Data Domain cannot be created........................................ |
221 |
|
Viewing the DD Boost storage unit password.................................................. |
221 |
Chapter 16 |
Modifying the System Settings |
223 |
PowerProtect Data Manager Administration and User Guide |
7 |
Contents
|
System settings.............................................................................................. |
224 |
|
Modify the network settings.............................................................. |
224 |
|
Modify the appliance time zone.......................................................... |
224 |
|
Change the system root user password............................................. |
224 |
|
Enable replication encryption............................................................. |
225 |
|
License types..................................................................................... |
225 |
|
PowerProtect Data Manager licenses................................................ |
226 |
|
System Support.............................................................................................. |
227 |
|
Register the Secure Remote Services gateway.................................. |
227 |
|
Callhome ........................................................................................... |
228 |
|
Set up the email server...................................................................... |
230 |
|
Add Auto Support............................................................................... |
231 |
|
Enable automatic upgrade package downloads................................... |
231 |
|
Add a log bundle................................................................................. |
231 |
|
Monitor system state and system health............................................ |
232 |
|
Configure PowerProtect Central reporting........................................ |
234 |
|
Modifying the PowerProtect Data Manager virtual machine disk settings...... |
235 |
|
Modify the virtual machine memory configuration............................. |
235 |
|
Modify the data disk size................................................................... |
235 |
|
Modify the system disk size............................................................... |
237 |
|
Configure the Data Domain system................................................................. |
237 |
Chapter 17 |
PowerProtect plug-in within the vSphere Client |
239 |
|
Overview of the PowerProtect plug-in within the vSphere Client................... |
240 |
|
Prerequisites to using the PowerProtect plug-in within the vSphere Client..... |
241 |
|
Monitor virtual machine protection copies...................................................... |
242 |
|
Restore a virtual machine protection copy in the vSphere Client.................... |
242 |
Chapter 18 |
VMware Cloud on Amazon Web Services (AWS) Support |
245 |
|
PowerProtect Data Manager image backup and recovery for VMware Cloud on |
|
|
AWS................................................................................................................ |
246 |
|
Configure the VMware Cloud on AWS web portal console.............................. |
246 |
|
Amazon AWS web portal requirements........................................................... |
247 |
|
Interoperability with VMware Cloud on AWS product features....................... |
247 |
|
vCenter server inventory requirements........................................................... |
248 |
|
VMware Cloud on AWS configuration best practices...................................... |
248 |
|
Add a VM Direct appliance.............................................................................. |
248 |
|
Protection and recovery operations................................................................ |
249 |
|
Interoperability with VMware Cloud on AWS product features....................... |
250 |
|
Unsupported operations in VMware Cloud on AWS ....................................... |
250 |
|
Troubleshooting VMware Cloud on AWS ....................................................... |
250 |
8 |
PowerProtect Data Manager Administration and User Guide |
As part of an effort to improve product lines, periodic revisions of software and hardware are released. Therefore, all versions of the software or hardware currently in use might not support some functions that are described in this document. The product release notes provide the most up-to-date information on product features.
If a product does not function correctly or does not function as described in this document, contact a technical support professional.
Note: This document was accurate at publication time. To ensure that you are using the latest version of this document, go to the Support website https://www.dell.com/support.
Note: References to Data Domain systems in this documentation, in the UI, and elsewhere in the product include Data Domain systems and the new PowerProtect DD systems.
Purpose
This document describes how to install, configure, and administer PowerProtect Data Manager software.
Audience
This document is intended for the host system administrator who is involved in managing, protecting, and reusing data across the enterprise by deploying PowerProtect Data Manager.
Revision history
The following table presents the revision history of this document.
Table 1 Revision history
Revision |
Date |
Description |
|
|
|
|
|
|
03 |
October 29, 2019 |
This revision includes the following updates: |
|
|
• File System agent limitations updates, |
|
|
including exclusions when performing |
|
|
block-based backups. |
|
|
• Add a protection policy for File System |
|
|
protection updates. |
|
|
|
02 |
September 27, 2019 |
Post GA updates. |
|
|
|
01 |
September 24, 2019 |
Initial release of this document for |
|
|
PowerProtect Data Manager 19.2. |
|
|
|
Related documentation
The following publications provide additional information:
•PowerProtect Data Manager Administration and User Guide
Describes how to configure the software.
•PowerProtect Data Manager Release Notes
Contains information on new features, known limitations, environment, and system requirements for the software.
•PowerProtect Data Manager Security Configuration Guide
Contains security information.
PowerProtect Data Manager Administration and User Guide |
9 |
Preface
•PowerProtect Data Manager Cloud Disaster Recovery Administration and User Guide
Describes how to deploy Cloud DR, protect VMs in the AWS cloud, and run recovery operations.
•PowerProtect Data Manager for Cyber Recovery User Guide
Describes how to install, upgrade, patch, and uninstall the Dell EMC PowerProtect Cyber Recovery software.
•PowerProtect Data Manager API documentation: https://developer.dellemc.com
Contains the PowerProtect Data Manager APIs and includes tutorials to guide to you in their use.
You can use the following resources to find more information about this product, obtain support, and provide feedback.
Special notice conventions that are used in this document
The following conventions are used for special notices:
NOTICE Identifies content that warns of potential business or data loss.
Note: Contains information that is incidental, but not essential, to the topic.
Typographical conventions
The following type style conventions are used in this document:
Table 2 Style conventions
Bold |
Used for interface elements that a user specifically selects or clicks, |
|
|
for example, names of buttons, fields, tab names, and menu paths. |
|
|
Also used for the name of a dialog box, page, pane, screen area with |
|
|
title, table label, and window. |
|
Italic |
Used for full titles of publications that are referenced in text. |
|
Monospace |
Used for: |
|
|
• |
System code |
|
• System output, such as an error message or script |
|
|
• Pathnames, file names, file name extensions, prompts, and |
|
|
|
syntax |
|
• |
Commands and options |
Monospace italic |
Used for variables. |
|
Monospace bold |
Used for user input. |
|
[ ] |
Square brackets enclose optional values. |
|
| |
Vertical line indicates alternate selections. The vertical line means or |
|
|
for the alternate selections. |
|
{ } |
Braces enclose content that the user must specify, such as x, y, or z. |
|
... |
Ellipses indicate non-essential information that is omitted from the |
|
|
example. |
You can use the following resources to find more information about this product, obtain support, and provide feedback.
10 PowerProtect Data Manager Administration and User Guide
Preface
Where to find product documentation
•https://www.dell.com/support
•https://community.emc.com
Where to get support
The Support website https://www.dell.com/support provides access to product licensing, documentation, advisories, downloads, and how-to and troubleshooting information. The information can enable you to resolve a product issue before you contact Support.
To access a product-specific page:
1.Go to https://www.dell.com/support.
2.In the search box, type a product name, and then from the list that appears, select the product.
Knowledgebase
The Knowledgebase contains applicable solutions that you can search for either by solution number (for example, KB000xxxxxx) or by keyword.
To search the Knowledgebase:
1.Go to https://www.dell.com/support.
2.On the Support tab, click Knowledge Base.
3.In the search box, type either the solution number or keywords. Optionally, you can limit the search to specific products by typing a product name in the search box, and then selecting the product from the list that appears.
Live chat
To participate in a live interactive chat with a support agent:
1.Go to https://www.dell.com/support.
2.On the Support tab, click Contact Support.
3.On the Contact Information page, click the relevant support, and then proceed.
Service requests
To obtain in-depth help from Licensing, submit a service request. To submit a service request:
1.Go to https://www.dell.com/support.
2.On the Support tab, click Service Requests.
Note: To create a service request, you must have a valid support agreement. For details about either an account or obtaining a valid support agreement, contact a sales representative. To find the details of a service request, in the Service Request Number field, type the service request number, and then click the right arrow.
To review an open service request:
1.Go to https://www.dell.com/support.
2.On the Support tab, click Service Requests.
3.On the Service Requests page, under Manage Your Service Requests, click View All Dell Service Requests.
Online communities
For peer contacts, conversations, and content on product support and solutions, go to the Community Network https://community.emc.com. Interactively engage with customers, partners, and certified professionals online.
PowerProtect Data Manager Administration and User Guide |
11 |
Preface
How to provide feedback
Feedback helps to improve the accuracy, organization, and overall quality of publications. You can send feedback to DPAD.Doc.Feedback@emc.com.
12 PowerProtect Data Manager Administration and User Guide
CHAPTER 1
This section includes the following topics:
•
•
Introducing PowerProtect Data Manager software................................................................ |
14 |
Accessing the PowerProtect Data Manager UI...................................................................... |
14 |
PowerProtect Data Manager Administration and User Guide |
13 |
Getting Started
PowerProtect Data Manager software is an enterprise solution that provides software-defined data protection, deduplication, operational agility, self-service, and IT governance.
PowerProtect Data Manager enables the transformation from traditional centralized protection to an IT-as-a-service model, based on a self-service design. This design ensures that you can enforce compliance and other business rules, even when backup responsibilities are decentralized to individual database administrators and application administrators.
PowerProtect Data Manager key features include:
•Software-defined data protection with integrated deduplication, replication, and reuse
•Data backup and recovery self-service operations from native applications that are combined with central IT governance
•Multi-cloud optimization with integrated cloud tiering
•SaaS-based management, compliance, and predictive analytics
•Modern services-based architecture for ease of deployment, scaling, and upgrading
PowerProtect Data Manager integrates multiple data protection products within the Dell EMC
Data Protection portfolio to enable data protection as a service, providing the following benefits:
•The data protection team can create data paths with provisioning, automation, and scheduling to embed protection engines into the infrastructure for high-performance backup and recovery.
•For large-scale environments, backup administrators can schedule Microsoft SQL and Oracle backups from a central location on the PowerProtect Data Manager server.
•PowerProtect Data Manager uses an agent-based approach to discover the protected and unprotected databases on an application server.
•PowerProtect Data Manager enables governed self-service and centralized protection by providing the ability to monitor and enforce Service Level Objectives (SLOs), identify violations of Recovery Point Objectives (RPO), and apply retention locks on backups created using the Microsoft application agent and the Oracle RMAN agent.
•PowerProtect Data Manager supports deploying an external VM Direct appliance for data movement with the VM Direct Engine. The PowerProtect Data Manager software comes prebundled with an embedded VM Direct appliance, which is automatically used as a fallback proxy for performing backup and restore operations when the added external proxies fail or are disabled. Dell EMC recommends that you always deploy external proxies because the embedded proxy has limited capacity for performing parallel backups.
•PowerProtect Data Manager supports integration of Cloud Disaster Recovery (Cloud DR), including workflows for Cloud DR deployment, protection, and recovery operations in the AWS cloud.
PowerProtect Data Manager provides a stand-alone UI that you can use to manage and monitor system behavior.
Procedure
1.From a host that has network access to the virtual appliance, use Google Chrome to connect to the appliance:
https://appliance_hostname
14 PowerProtect Data Manager Administration and User Guide
Getting Started
Note: You can specify the hostname or the IP address of the appliance.
2.Log in with your user name and password.
If you receive an unsigned certificate warning, see Replacing the default PowerProtect Data Manager certificate on page 15 for instructions.
The Getting Started page appears.
•The left pane provides links to the available menu items. Expand a menu item for more options.
•The icons in the PowerProtect Data Manager banner provide additional options.
Use this procedure to replace the PowerProtect Data Manager UI and public API facing certificates with new self-signed or CA signed certificates.
Before you begin
You must have the following keys and certificates in place:
•/etc/ssl/certificates/customer/customerkey.pem
•/etc/ssl/certificates/customer/customer.pem
•/etc/ssl/certificates/customer/customer.keystore
•/etc/ssl/certificates/customca/customca.truststore
Procedure
1.Log in to the PowerProtect Data Manager system as the root user.
Note: PowerProtect Data Manager does not support using the ssh command with the
root account. To use ssh to connect to the system and change the password for the root account, log in to ssh with the admin account, and then use the su command to change to the root account.
2.Run the following Unix commands:
cd /usr/local/brs/lib/ecdm-ui/app
ln -s /etc/ssl/certificates/customer/customer.pem cert.pem
ln -s /etc/ssl/certificates/customer/customerkey.pem private-key.pem sudo systemctl restart nginx
3.Update the /usr/local/brs/lib/zuul/conf/application.yml file with following parameters:
key-store: Specify the file path where your key-store certificate is kept. For example: /etc/ssl/certificates/customer/customer.keystore
key-store-password: Specify a key-store password. key-password: Specify a key password.
key-alias: Specify a key alias.
trust-store: Specify the file path where your trust-store certificate is kept. For example: /etc/ssl/certificates/customca/customca.truststore
trust-store-password: Specify a trust-store password.
PowerProtect Data Manager Administration and User Guide |
15 |
4.Carry out the command: zuul restart
5.Log in to the https://ecdm.customer.com instance.
6.When prompted, accept the certificate.
7.Login to https://ecdm.customer.com:8443.
All external requests are now using your installed certificates.
Getting Started
The Getting Started page provides configuration options that are required when the system is first deployed.
The Getting Started page appears upon first deployment of PowerProtect Data Manager and opens to this page by default until you click Skip This.
You can access the Getting Started page at any time by selecting System Settings > Getting Started.
Table 3 PowerProtect Data Manager Getting Started menu items
Options |
Description |
|
|
|
|
Support |
View and configure Secure Remote Services (SRS), Email Setup, Auto |
|
Support, Logs, System Health. |
|
|
Disaster Recovery |
Configure and manage backups for disaster recovery. |
Backup |
|
|
|
VMware vCenter |
Opens the Infrastructure > Asset Sources page where you can add a |
|
vCenter instance as an asset source so that it can be added to a |
|
protection policy. |
|
|
Protect Assets |
Opens the Protection Policies page where you can manage Protection |
|
Life Cycle workflows for all asset types. |
|
|
Learn about the available tools in the UI.
PowerProtect Data Manager UI tools
Table 4 PowerProtect Data Manager tools
Menu item |
Description |
|
|
|
|
|
Provides a high-level view of the overall state the PowerProtect Data |
|
Manager system and includes the following information: |
Dashboard |
• Alerts—System alerts |
|
• Protection—Details about protection policies |
|
• Jobs—Status of all Jobs filtered by a selected time frame or |
|
status type. Select the status in the Jobs pane to open the Jobs |
|
window, where you can manage jobs, search, and view details. |
|
• Policy—Details include number of successes, failures, and |
|
excluded assets for each asset type |
|
• Protection Storage—Protection storage usage statistics |
|
|
16 PowerProtect Data Manager Administration and User Guide
Getting Started
Table 4 PowerProtect Data Manager tools (continued)
Menu item |
Description |
||
|
|
|
|
|
|
|
|
|
• |
Recovery—Recovery statistics |
|
|
• Health—Details about the health of the system, including |
||
|
|
services, licenses, support, protection engines, server backups, |
|
|
|
and uptime. |
|
|
PowerProtect Data Manager refreshes the data hourly unless you run |
||
|
an ad-hoc discovery. |
||
|
|
||
|
Click Infrastructure to perform the following tasks: |
||
|
• View and manage Virtual Machine, SQL Database, Oracle |
||
Infrastructure |
|
Database, and File System assets |
|
|
• Add vCenter and Application and File System Host asset sources |
||
|
• View and manage Integrated Storage |
||
|
• Add a VM Direct appliance with the VM Direct protection engine |
||
|
|
for virtual machine data protection |
|
|
• Manage registration of RMAN Agent, Microsoft Application Agent, |
||
|
|
and File System Agent |
|
|
• View and manage Cloud disaster recovery |
||
|
|
||
|
Click Protection to perform the following tasks: |
||
|
|||
|
• Add protection policy groups to SQL and Oracle databases, File |
||
Protection |
|
Systems, and Virtual Machines |
|
|
• |
Manage SLA |
|
|
• Add, edit, and delete Dynamic Groups to SQL and Oracle |
||
|
|
databases, File Systems, and Virtual Machines |
|
|
|
||
|
Click Recovery to perform the following tasks: |
||
Recovery |
• |
View asset copy location details and initiate a Restore operation |
|
• Manage Instant Access Sessions |
|||
|
|||
|
|
||
|
Click Alerts to perform the following tasks: |
||
|
• View and acknowledge alerts and events. |
||
Alerts |
• |
View and drill down to Audit Logs. |
|
|
|||
|
• Export audit logs to CSV files. |
||
|
• Set audit log boundaries. |
||
|
|
||
|
Click Administration to perform the following tasks: |
||
|
• Configure users and roles |
||
Administration |
• |
Set password credentials and manage key chains |
|
|
|||
|
• |
Configure alert notifications |
|
|
• Add LDAP Identity Sources |
||
|
|
||
|
Click Jobs to manage jobs, view by completed or running, filter, and |
||
|
view details. |
||
|
|
|
PowerProtect Data Manager Administration and User Guide |
17 |
Getting Started
Table 4 PowerProtect Data Manager tools (continued)
Menu item |
Description |
Jobs
Click Reporting to log in to PowerProtect Central.
Reporting
Additional UI options
The following table describes the icons located in the PowerProtect Data Manager banner.
Table 5 Additional options
Option |
Description |
|
|
|
|
|
Click to enter search criteria to find assets, jobs, logs, and alerts. |
|
|
|
Click to see recent alerts. |
|
|
|
Click to configure and manage PowerProtect Data Manager system |
|
network, time zone, and NTP settings, DR backups, security, licenses, |
|
upgrades, authentication, agent downloads, and support, and to |
|
access the Getting Started page. |
|
|
|
Click to log out and log in as a different user. |
|
|
|
Click to see PowerProtect Data Manager version information. |
|
|
|
Click to obtain more information about PowerProtect Data Manager |
|
and how it can help you manage your backup copies. |
|
|
18 PowerProtect Data Manager Administration and User Guide
CHAPTER 2
This section includes the following topics:
•
•
•
•
•
Managing user roles and privileges ....................................................................................... |
20 |
Resetting system-generated VM Direct credentials.............................................................. |
30 |
Managing LDAP or AD groups............................................................................................... |
30 |
Managing keychains............................................................................................................... |
31 |
LDAP or AD authentication.................................................................................................... |
31 |
PowerProtect Data Manager Administration and User Guide |
19 |
Users can be defined as either local or LDAP/Active Directory. Users and LDAP groups can access all protection policies and assets within the PowerProtect Data Manager environment.
The role that is assigned to a user defines the privileges that are associated with the user and determines the tasks that the user can perform.
Managing users
Only the Admin role can manage users.
The following roles can view users, roles, identity sources, and user groups:
•Admin
•User
•Export and Recovery Admin
Users can see only their own role within their own account.
Note: User authorization grants or denies users access to PowerProtect Data Manager resources. Authorization is the same for locally authorized users and Microsoft Windows Active Directory/LDAP users.
You can create local users to perform management tasks. When you create a local user account, you must assign a role to the user.
Add a user
You must have administrator credentials to add a user.
Procedure
1.Select Administration > Users. The Users window appears.
2.Click Add.
3.In the New User window, provide the following information:
•User first name
•User last name
•Username
•Email Address
•Password
•Retype to confirm password
•Force Password Change—Enabled by default. Requires the user to update the password at first login.
•Role
4.Click Save.
Results
The newly added user appears in the Users window.
20 PowerProtect Data Manager Administration and User Guide
Managing Users
Edit or delete a user
You must have administrator credentials to edit or delete a user.
Procedure
1.Select Administration > Users.
The Users window displays the following information:
•Username
•User first name
•User last name
•User email address
•User role
•Date the user was created
2.Select the user you want to edit or delete.
3.Do one of the following:
•To delete the user, click Delete.
•To edit the user, click Edit, modify the user fields, and then click Save.
Results
The changes appear in the Users window.
Reset a password
Local users can reset a forgotten password using this procedure.
Before you begin
•The user must be a a local user.
•A reset password mail server must be configured.
•LDAP and Windows Active Directory users cannot reset their password using this procedure. Contact the system administrator to reset your password.
About this task
Local users can receive an email with a link to reset their password. The reset password link in the email expires in 20 minutes, after which time they must request another link.
Procedure
1.In the PowerProtect Data Manager login page, click Forgot Password.
2.In the Forgot Password dialog box, type your user name, click Send Link, and click OK to dismiss the informational dialog box.
The system sends a message to the email address associated with your user name.
3.Open the email and click the link.
4.In the Reset Password dialog box, type a new password in the New Password and
Confirm New Password fields, and click Save.
The PowerProtect Data Manager login page appears.
5.Log in with your user name and new password.
PowerProtect Data Manager Administration and User Guide |
21 |
Managing Users
The default admin user is preassigned the Admin role during PowerProtect Data Manager installation.
The default admin user has super user control over PowerProtect Data Manager and cannot be deleted. However, you can modify the attributes of the default admin user.
A role defines the privileges and permissions that a user has to perform a group of tasks. When a user is assigned a role, you grant the user all of the privileges that are defined by the role. Only one role can be associated to a user account.
Admin role
Admin
The Admin role is responsible for setup, configuration, and all PowerProtect Data Manager management functions. The Admin role provides systemwide access to all functionality across all organizations. One default Admin role is assigned at PowerProtect Data Manager deployment and installation. You can add and assign additional Admin roles to users in your organization who require full access to the system.
This table outlines the privileges and tasks that are associated with the Admin role.
Table 6 Admin role privileges and tasks
Privileges |
Tasks |
||
|
|
|
|
|
|
|
|
Activity Management |
• |
Manage Discovery Jobs |
|
|
|||
|
• |
Manage Tasks |
|
|
• |
Workflow Execution |
|
|
|
|
|
Asset Management |
• |
View Data Source Assets |
|
|
|||
|
• Manage Data Source Assets |
||
|
• View Protection Storage Targets |
||
|
• Manage Protection Storage Targets |
||
|
|
|
|
Monitoring |
• |
Monitor Events |
|
|
|||
|
• |
Manage Events |
|
|
• |
View Historical Data |
|
|
• View Tasks and Activities |
||
|
|
|
|
Recovery and Reuse |
• |
View Host |
|
Management |
|||
• |
Manage Host |
||
|
|||
|
• |
Rollback to Production |
|
|
• Recovery to New Location |
||
|
• |
Export for Reuse |
|
|
|
|
22 PowerProtect Data Manager Administration and User Guide
Managing Users
Table 6 Admin role privileges and tasks (continued)
Privileges |
Tasks |
||
|
|
|
|
|
|
|
|
Service Plan |
• |
View Plans |
|
Management |
|||
• |
Manage Plans |
||
|
|||
|
• Assign Data Source to Plan |
||
|
|
|
|
Security and System |
• |
Monitor Security/System Audit |
|
Audit |
|||
• |
Manage Security/System Audit |
||
|
|||
|
|
|
|
Storage Management |
• |
View Storage Array |
|
|
|||
|
• |
Manage Storage Array |
|
|
• |
View Inventory Sources |
|
|
• |
Manage Inventory Sources |
|
|
|
|
|
Support Assistance and |
• |
View Diagnostic Logs |
|
Log Management |
|||
• |
Manage Diagnostic Logs |
||
|
|||
|
|
|
|
System Management |
• |
View System Settings |
|
|
|||
|
• |
Manage System Settings |
|
|
|
|
|
User/Security |
• |
Manage User Security |
|
Management |
|||
• |
View User Security |
||
|
|||
|
|
|
User role
User
The User role is responsible for monitoring the PowerProtect Data Manager Dashboard, Activity Monitor, and Notifications. The User role provides read-only access to monitor activities and operations. Assign the User role to users in your organization who monitor Dashboard activities,
Activity Monitor, and Notifications but do not require the ability to configure the system. This table outlines the privileges and tasks that are associated with the User role.
Table 7 User role privileges and tasks
Privileges |
Tasks |
|
|
|
|
|
|
|
Activity Management |
• |
Workflow Execution |
|
||
|
|
|
Asset Management |
• |
View Data Source Assets |
|
||
|
• View Protection Storage Targets |
|
|
|
|
Monitoring |
• |
Monitor Events |
|
||
|
• |
View Historical Data |
|
• View Tasks and Activities |
|
|
|
|
PowerProtect Data Manager Administration and User Guide |
23 |
Managing Users
Table 7 User role privileges and tasks (continued)
Privileges |
Tasks |
||
|
|
|
|
|
|
|
|
Recovery and Reuse |
• |
View Host |
|
Management |
|||
|
|
||
|
|
|
|
Service Plan |
• |
View Plans |
|
Management |
|||
|
|
||
|
|
|
|
Security and System |
• |
Monitor Security/System Audit |
|
Audit |
|||
|
|
||
|
|
|
|
Storage Management |
• |
View Storage Array |
|
|
|||
|
• |
View Inventory Sources |
|
|
|
|
|
Support Assistance and |
• |
View Diagnostic Logs |
|
Log Management |
|||
|
|
||
|
|
|
|
System Management |
• |
View System Settings |
|
|
|||
|
|
|
|
User/Security |
• |
View User Security |
|
Management |
|||
|
|
||
|
|
|
Export and Recovery Admin role
Export and Recovery Admin
The Export and Recovery Admin role is defined for a dedicated set of users who are solely responsible for PowerProtect Data Manager setup, configuration, and execution of data management tasks such as copy export and recovery operations. The Export and Recovery Admin role provides access only to those functions required for data export and recovery operations. This role and its operations are intended for a limited set of users whose actions are solely focused on data management, export, and recovery; and whose actions are audited routinely for security purposes. Assign the Export and Recovery Admin role to a user in your organization that requires access to data only to make it available to others in the organization to maintain a chain of custody record.
This table outlines the privileges and tasks that are associated with the Export and Recovery Admin role.
Table 8 Export and Recovery Admin role privileges and tasks
Privileges |
Tasks |
||
|
|
||
|
|
|
|
Activity Management |
None |
||
|
|
|
|
Asset Management |
• |
View Data Source Assets |
|
|
|||
|
• View Protection Storage Targets |
||
|
|
|
|
Monitoring |
• |
Monitor Events |
|
|
|||
|
• |
View Historical Data |
|
|
• View Tasks and Activities |
||
|
|
|
|
Recovery and Reuse |
• |
View Host |
|
Management |
|||
• |
Manage Host |
||
|
|||
|
|
|
24 PowerProtect Data Manager Administration and User Guide
Managing Users
Table 8 Export and Recovery Admin role privileges and tasks (continued)
Privileges |
Tasks |
||
|
|
|
|
|
|
|
|
|
• |
Rollback to Production |
|
|
• Recovery to New Location |
||
|
• |
Export for Reuse |
|
|
|
||
Service Plan |
None |
||
Management |
|
|
|
|
|
||
Security and System |
None |
||
Audit |
|
|
|
|
|
|
|
Storage Management |
• |
View Storage Array |
|
|
|||
|
|
|
|
Support Assistance and |
• |
View Diagnostic Logs |
|
Log Management |
|||
|
|
||
|
|
|
|
System Management |
• |
View System Settings |
|
|
|||
|
|
|
|
User/Security |
• |
View User Security |
|
Management |
|||
|
|
||
|
|
|
Privileges
PowerProtect Data Manager privileges define the tasks that a user can perform and these privileges are assigned to roles.
Activity Management Privileges
This table defines the Activity Management Privileges.
Table 9 Activity Management Privileges
Privilege |
Task |
||
|
|
|
|
|
|
|
|
Manage Discovery |
• |
Create discovery jobs. |
|
Jobs |
|||
• |
View discovery jobs. |
||
|
|||
|
• |
Edit discovery jobs. |
|
|
• |
Delete discovery jobs. |
|
|
|
|
|
Manage Task |
• |
Create task resources. |
|
|
|||
|
• |
View task resources. |
|
|
• |
Edit task resources. |
|
|
|
|
|
Workflow Execution |
• |
Start workflow execution. |
|
|
|||
|
• |
Cancel workflow execution. |
• View the status of workflow execution.
PowerProtect Data Manager Administration and User Guide |
25 |
Managing Users
Asset Management Privileges
This table defines the Asset Management Privileges.
Table 10 Asset Management Privileges
Privilege |
Task |
||
|
|
|
|
|
|
|
|
Manage Data Source |
• |
Create, read, edit, and delete a data source. |
|
Assets |
|||
• |
Create, view, edit, and delete the policy in the protection |
||
|
|||
|
|
group resource. |
|
|
• Create, view, edit, and delete asset group resources. |
||
|
• Create, view, edit, patch, and delete tag category resources. |
||
|
|
|
|
Manage Protection |
• |
Create, view, edit, and delete a data target. |
|
Storage Targets |
|||
• |
Create, view, edit, and delete asset group resources of |
||
|
|||
|
|
protection storage targets. |
|
|
|
|
|
View Data Source Assets |
• |
View a data source. |
|
|
|||
|
• View asset group resources. |
||
|
• View the policy of the protection group resource. |
||
|
• View tag category resources. |
||
|
|
|
|
View Protection Storage |
• |
View a data target. |
|
Targets |
|||
|
|
||
|
|
|
Monitoring Privileges
This table defines the Monitoring Privileges.
Table 11 Monitoring Privileges
Privilege |
Task |
|
|
|
|
|
|
|
View Tasks or Activities |
• |
View task resources. |
|
||
|
|
|
View Historical Data |
• |
View historical data that relates to plans, arrays, data |
|
||
|
|
targets, data sources, and capacity data. |
|
|
|
Monitor Events |
• |
View alerts. |
|
||
|
• |
View external notifications. |
|
|
|
Manage Events |
• |
Acknowledge alerts and add notes. |
|
||
|
• Create, modify, and delete external notifications. |
|
|
|
|
Service Policy Management Privileges
This table defines the Policy Management Privileges.
26 PowerProtect Data Manager Administration and User Guide
Managing Users
Table 12 Policy Management Privileges
Privilege |
Task |
|
|
|
|
|
|
|
Assign Data Source to |
• |
Assign a data source to a protection policy resource. |
Policy |
|
|
|
|
|
Manage Policies |
• |
Create, view, edit, and delete the policy for a protection policy |
|
||
|
|
resource. |
|
• Create, view, edit, and delete a policy definition resource. |
|
|
• Create, view, edit, and delete schedule resources. |
|
|
• Create, view, edit, and delete an objective definition resource. |
|
|
• Create, read, edit, and delete an action definition. |
|
|
|
|
View Policies |
• |
View the policy for a protection policy resource. |
|
||
|
• |
View schedule. |
|
• View a protection policy definition. |
|
|
• |
View objective definition. |
|
• |
View services. |
|
• |
View service resources. |
|
• View assets that are assigned to a protection policy. |
|
|
• |
View action definitions. |
|
• View asset group resources. |
|
|
|
|
Recovery and Reuse Management Privileges
This table defines the Recovery and Reuse Management Privileges.
Table 13 Recovery and Reuse Management Privileges
Privilege |
Task |
||
|
|
|
|
|
|
|
|
Export for Reuse |
• |
Create, view, edit, and start export and reuse operations. |
|
|
|||
|
|
|
|
Roll back to |
• |
Create, view, edit, and start rollback to production operations. |
|
Production |
|||
|
|
||
|
|
|
|
Recovery to Alternate |
• |
Create, view, edit, and start recovery to alternate location |
|
Location |
|
operations. |
|
|
|
||
|
|
|
|
Manage Host |
• |
Create, view, edit and delete a host. |
|
|
|||
|
|
|
|
View Host |
• |
View a host. |
|
|
|||
|
|
|
Storage Management Privileges
This table defines the Storage Management Privileges.
PowerProtect Data Manager Administration and User Guide |
27 |
Managing Users
Table 14 Storage Management Privileges
Privilege |
Task |
||
|
|
|
|
|
|
|
|
View Inventory |
• |
View a management interface. |
|
Sources |
|||
• |
Read storage manager resources such as exported, deleted, and |
||
|
|||
|
|
restored copies. |
|
|
|
|
|
View Storage Array |
• |
View a storage array. |
|
|
|||
|
|
|
|
Manage Storage |
• |
Create, view, edit, and delete a storage array. |
|
Array |
|||
|
|
||
|
|
|
|
Manage Inventory |
• |
Create storage manager resources and run creation-related |
|
Sources |
|||
|
storage array operations. |
||
|
|
||
|
• Create exported and restored copies and run restore-related |
||
|
|
storage array operations. |
|
|
• Create expunged copies and run deletion-related storage array |
||
|
|
operations. |
|
|
• Create, view, edit, and delete a management interface. |
||
|
|
|
Security Management Privileges
This table defines the Security Management Privileges.
Table 15 Security Management Privileges
Privilege |
Task |
|
|
|
|
|
|
|
Manage User Security |
• |
Create, view, edit, and delete users |
|
• |
View roles |
|
• Create, view, edit, and delete identity sources |
|
|
• Create, view, edit, and delete user groups |
|
|
• Create, view, edit, and delete whitelists |
|
|
|
|
View User Security |
• |
View users and roles |
|
||
|
• View identity sources and user groups |
|
|
• |
View whitelists |
|
|
|
System Management Privileges
This table defines the System Management Privileges.
Table 16 System Management Privileges
Privilege Task
View System Settings • View SRS information.
28 PowerProtect Data Manager Administration and User Guide
Managing Users
Table 16 System Management Privileges (continued)
Privilege |
Task |
||
|
|
||
|
|
|
|
|
• View Server Disaster Recovery artifacts. |
||
|
• |
View Maintenance Mode. |
|
|
• |
View License information. |
|
|
• View Server Disaster Recovery Status. |
||
|
• View node, Configuration EULA, OS User, Upgrade Package, |
||
|
|
Component, Configuration Status, Configuration Logs, Time |
|
|
|
Zone, and State resources |
|
|
|
|
|
Manage System |
• |
Manage Server Disaster Recovery activities. |
|
Settings |
|||
• |
Manage SRS Gateway connection and other Telemetry |
||
|
|||
|
|
communications. |
|
|
• View and edit Node State resource. |
||
|
• Update the license for the appliance. |
||
|
• View Component, Configuration Status, Configuration Logs, Time |
||
|
|
Zone, and State resources |
|
|
• View and edit node, Configuration EULA, OS User, and Lockbox |
||
|
|
resouces. |
|
|
• Create, view, edit, and delete the Upgrade Package resource |
||
|
|
|
Support Assistance and Log Management Privileges
This table defines the Support Assistance and Log Management Privileges.
Table 17 Support Assistance and Log Management Privileges
Privilege |
Task |
||
|
|
|
|
|
|
|
|
View Diagnostic Logs |
• |
View Log bundle resources. |
|
|
• View Log information resources. |
||
|
• View the LogSource resource. |
||
|
• |
View logs. |
|
|
|
|
|
Manage Diagnostic |
• |
Manage Log bundle resources. |
|
Logs |
|||
• |
Retrieve Log information resources. |
||
|
|||
|
• Retrieve or edit the LogSource resource. |
||
|
• |
Export logs. |
|
|
|
|
Security and System Audit Privileges
This table defines the Security and System Audit Privileges.
PowerProtect Data Manager Administration and User Guide |
29 |
Managing Users
Table 18 Security and System Audit Privileges
Privilege |
Task |
||
|
|
|
|
|
|
|
|
Monitor Security/ |
• |
View Security Audit–related events and activities. |
|
System Audit |
|||
|
|
||
|
|
|
|
Manage Security/ |
• |
Acknowledge Security Audit–related events and activities. |
|
System Audit |
|||
• |
Export Audit/Change Log of events and activities. |
||
|
|||
|
|
|
PowerProtect Data Manager deploys the VM Direct Engine during installation with unique admin and root credentials.
About this task
You must have PowerProtect Data Manager Admin role privileges to edit or delete a user.
Procedure
1.Select Administration > Credentials.
The Credentials Management window appears and displays the type, name, and username.
2.Select a VM Direct user and click Edit.
3.Modify the password in the Edit Credentials window and click Save.
4.Select Infrastructure > Protection Engines > VM Direct Engines.
5.Select a VM Direct Engine.
6.Select redeploy from the ellipsis list.
PowerProtect Data Manager requires you to configure an LDAP group, and the PowerProtect Data Manager users must be part of this group. Only the Admin role can create users or LDAP and AD groups.
Users
You can create local users to perform management tasks. When you create a local user account, you must assign a role to the user.
LDAP or AD groups
When you configure LDAP or AD authentication in the Authentication Service, use the User Group resources to assign roles to the LDAP groups. The User Group resource defines the role assignments for an LDAP or AD user group.
30 PowerProtect Data Manager Administration and User Guide