Skip to main content
Hitachi Vantara Knowledge

Access Control

Access Control Concepts

This section describes Ops Center Protector's access control features.

For further information, refer to:

About Role Based Access Control (RBAC)

Role Based Access Control (RBAC) is a framework for defining what a user can see and do within Protector. Users are only allowed to perform activities that are contained within the roles they are assigned. Furthermore they can only perform those activities on the resources to which they have access.

When setting up access control, the following must be defined:

  • How a user's credentials will be verified (Authentication).
  • What rights of access a user will be granted (Authorisation).

About Access Permissions

Data flows, policies, schedules and notifications are created in Protector to configure its behaviour. Access to these configuration objects is controlled by granting Permissions. Permissions determine if a particular user or group has Read Only Access or Read Write Access to a configuration object.

Permissions are a secondary access check within Protector.

Taking policies as an example:

The system will first check if a user has the RBAC activity View Policies. If they don't then they won't be able to see anything. If they do then for all policies that exist, the system looks at the permission on each one. E.g:

Policy1 - created by Paul@Contoso.com has READ/WRITE access (he can see Policy1)

Policy2 - created by Ian@Contoso.com has READ/WRITE access (Paul cannot see Policy2; Ian can)

Policy3 - created by Ian@Contoso.com has READ/WRITE access, shared with Paul@Contoso.com with READ access. paul can see Policy3 but he cannot edit it.

Policy4 - created by Ian@Contoso.com has READ/WRITE access, shared with Contoso.com\Managers group with READ access. Paul is not in the managers group so he can't see Policy4. However, Simon@Contoso.com is, so he can see Policy4 but can't change it.

About Ops Center Protector's implementation of RBAC

Ops Center Protector's RBAC Object Structure
GUID-2FFEBD83-ABA4-4C05-96DD-2E85A54213F6-low.png

An Activity is an operation (typically of the type: create, read, update or delete) that is performed on a resource, backup or other object within Protector. For example:

  • a node may be created and have its properties viewed or modified.
  • a data flow may be created, viewed, edited or deleted.
  • a snapshot may be created, browsed, restored or retired.

Activities are arranged into Activity Groups that represent a cohesive set of activities relating to features such as Nodes, Data Flows and Logs. Activity groups make it easier to organise, locate and assign activities.

Roles contain a set of activities. For example, the role Backup Administrator is assigned to a user tasked with managing nodes, creating backup policies and restoring backups, whereas the role Security Administrator is assigned to a user responsible for authentication and authorisation of other users.

Resource Groups define a collection of physical and logical computing or storage resources that a user is permitted to access (such as groups of servers, storage devices, repositories etc.). The visibility of any given Resource within the Protector system is determined by whether that resource appears in the ACPs assigned to the user at authorization time.

Access Control Profiles combine Roles and Resource Groups to define the activities that can be carried out on groups or resources.

Authentication Spaces specify which authentication service to use for a specific user or group of users. Authentication services supported include Active Directory, LDAP, RADIUS and Local system logon. Protector enables you to simultaneously configure multiple authentication services. Protector also supports OpenID Connect to enable integration with Hitachi Ops Center's single sign-on functionality.

ACP Associations link individual users and groups of users to one or more Access Control Profiles so as to grant them the required level of authority. Authentication is performed when a user or group attempt to log on, by passing a user's credentials to the authentication service specified by the Authentication Space.

Backup data sets (such as the volumes and files included in a snapshot or a replicated file system) are created, archived, restored and retired by Protector as the result of executing backup policies. These backup objects store information about the resource from which the backup data originated. The visibility of the backup object (in some storage location such as a repository) is then generally governed by whether the user has access to the node from which the data originated.

To enable RBAC to be configured quickly and easily, Protector is shipped with a number of predefined Activity Groups, Roles, a default Resource Group, Access Control Profiles and an administrator level ACP Association (refer to How to configure basic role based access control). These predefined RBAC objects can, if required, be tailored to suit each customer’s specific environment, as described in How to configure advanced role based access control.

Selecting an Authentication Service

Protector can be configured to authenticate users and groups against the following:

  • Local accounts on a Protector node running any supported OS.
  • Accounts in Active Directory via a Protector proxy node running Windows.
  • Accounts on an LDAP Server via a Protector proxy node running Linux.
  • Accounts on a RADIUS server via a Protector proxy node running any supported OS.
  • Accounts in Hitachi Ops Center via OpenID Connect to support single sign-on.

When a user logs in via the Protector web UI they must provide either their:

  • Username – to identify themselves to Protector.
  • Authentication Space - to tell Protector which authentication service to use.
  • Password – to authenticate themselves.

or, if integrated with Hitachi Ops Center, redirect to the single sign-on page to provide their Ops Center credentials.

Authentication spaces

Protector uses the concept of Authentication Spaces when authenticating users. The Authentication Space tells the Protector master node which authentication service is able to validate a specific user's login credentials. Authentication requests are routed, by the master, to the proxy node responsible for communicating with the authentication service in question.

Although it is possible to nominate the master node as the proxy, it is often the case that the master node is either not in the required space or is of the wrong OS type. Consider the following scenario:

Authentication in a multi-space Protector environment
GUID-3E508D3C-4613-455B-8C73-A3BEB06C01E2-low.png

Here the Protector master node is responsible for nodes in three separate spaces, so a separate proxy is required to communicate with each authentication service. It is possible to have different authentication service types for each space.

Each Authentication Space requires configuration within Protector. The name of the authentication space forms part of the user's login. For example:

  • An Active Directory authentication space could be configured to point to the AD server ContosoDC.HV.local and could be named Contoso. Users in this AD domain must authenticate with Protector using <username>@Contoso. Here Contoso is used as an alias for ContosoDC.HV.local. If you want to use the full domain name then the authentication space must also be named using the full domain name.
  • A Local Machine Accounts authentication space is configured to point to the computer TBell-Win7PC and could be named TBW7. Users with local accounts on the machine TBell-Win7PC must authenticate with Protector using <username>@TBW7. Here TBW7 is used as an alias for TBell-Win7PC. If you want to use the full computer name then the authentication space must also be named using the full computer name.
About Single Sign-On with Hitachi Ops Center

Protector can be integrated with Hitachi Ops Center and supports Ops Center's OpenID Connect based single-sign-on mechanism.

When Protector is installed with Ops Center, it is registered with Ops Center's OpenID Connect Provider. A corresponding OpenID Connect authentication space is also automatically added to Protector during the regsitration process.

When registered with Ops Center, Protector displays a button on it's login page that enables users to be redirected to Ops Center's authentication page. Once authenticated by Ops Center's authorization server, users are redirected to the Protector UI and granted access as normal.

The OpenID Connect authentication space added to Protector can be used, in the same way as any other type of authentication space, to create the required ACP Associations that grant the required permissions.

NoteOnly Group ACP Associations are supported for Ops Center OpenID Connect authentication spaces.

Authorising users and restricting access

Authorisation is granted to a user, group or entire authentication space by associating it with one or more ACPs. Each ACP defines a role that the user is assigned and one or more resource groups:

  • The role defines what activities the user is allowed to perform.
  • The resource groups define which resources the user is able to interact with.

In practice, an ACP is constructed by considering the following:

  • What responsibilities will the users be given?
  • What should the users be allowed to do?
  • Which nodes should be visible to the users?

Bear in mind that if a resource is not included in a user’s resource group then it will not appear in any Protector view for that user, be it node lists, data flow diagrams, monitor views, reports, storage inventories, logs etc. So consider whether users should be prevented from seeing resources or simply restricted in what they can do with those resource

Default access control configuration

Access control is configured to default setting immediately after installing the Protector master for the first time. The Protector administrator must log on via the web UI using the <username> credentials specified in the Master installation. This user is granted full access to everything within Protector allowing them to configure access control and any other aspect of Protector. The following access control objects are automatically defined at installation:

  • The Master authentication space is used to direct authentication to the OS on the master node.
  • The <Username>@Master ACP association grants the <username>@master user the built-in Default Administrator ACP.
  • The Default Administrator ACP is given the role Protector Admin which allows all activities to be performed. This ACP also grants access to all nodes and all backups on any storage location.
  • The default resource group includes all Protector nodes that identify themselves to the master node, be they authorised or unauthorised.
NoteIt is recommended that: the top echelon of administrator accounts are created first, allowing lower level administrators to configure their resources and access rights independently.
Planning roles

Roles tend to follow reasonably consistent patterns across organisations, so in a multi-tenant environment for example, it is worth considering how roles can be defined so as to be reusable across each tenant’s environment. When roles are defined at a general level they can be reused in ACPs for defining specific privileges. Thus a role such as Backup Administrator could be reused by multiple ACPs such as Accounts Backup Admin, Legal Backup Admin and Production Backup Admin. What differs between these ACPs are the accessible resources, not the activities that will be performed on them.

Protector ships with a number of pre-defined roles that can be cloned and modified or used as-is.

Planning resource groups

Resource groups are the mechanism for restricting the visibility of nodes in Protector. When a user is associated with an ACP, they will be restricted to viewing only those nodes listed in the resource groups included in that ACP.

NoteResource groups control visibility of nodes. What the user is able to do with those nodes is dependent on the activities they are allowed to perform on them.

Resource groups are typically defined based on tenancy, organisational, divisional and departmental hierarchies. These hierarchies are likely to exist already in the IT infrastructure and can thus be reused as a basis for creating resource groups.

Applying access levels

An Access Level is attached to each resource group in an ACP. The access level controls which backups (including any logs or reports relating to that backup) are visible, and can be set to one of the following:

  • FULL – All backups in a given storage location (e.g. a repository) are visible to the user irrespective of where the data originated from.
  • LIMITED – Backups are visible if they originated from any of the nodes contained in the ACPs assigned to the user.

    For LIMITED to work the storage node needs to be in the same resource group as the source nodes. For example, if a resource group is created with only a storage node in it and a user has FULL access to it, they can see all of the backups on that node. If the user has LIMITED access they can see no backups even if they have access to other resource groups.

NoteThe access level only controls the visibility. What a user is able to do with visible backups is dependent on the activities they are allowed to perform on them.

A user given LIMITED access to a storage destination included in their resource group will only see log messages for that storage destination if they pertian to their backups. A user given FULL access level will see all log messages for that destination.

Access Control UI Reference

This section describes the Access Control UI, accessed via the Navigation Sidebar.

For further information, refer to:

Login Page

The user enters their credentials on this page in order to gain access to the web based user interface.

Login Page
GUID-9C7AB5C3-97DA-4FBB-AB30-838DA38D479A-low.png
Control Description
Username@AuthenticationSpace Enter the username and Authentication Space in the format Username@AuthenticationSpace. Authentication Spaces are configured via the Access Control Authentication Spaces Inventory.
Password Enter the password for the given username
GUID-7219D534-66FE-46EC-8DCC-709517FB084D-low.png Click to login. If authentication succeeds, the Default Dashboard will be displayed. If authentication fails for any reason, a message will be displayed just below the Username and Password fields.
Login withWhen Protector is integrated with Hitachi Ops CenterOps Center, this button is displayed to enable users to log in using SSO (Single Sign-On). The name of the OpenID Connect authentication space is displayed on the button.

In this case, the Username@AuthenticationSpace and Password fields should be left unpopulated; the user being redirected to the appropriate SSO authentication page.

Access Control Dashboard

This dashboard enables the configuration of role based access control (RBAC) for users and groups who interact with Protector.

TipWhen configuring RBAC, start by defining Roles and Resource Groups first, then ACPs and Authentication Spaces. Finally define ACP Associations.
Access Control Dashboard
GUID-66A9915B-208F-48FC-BACB-1FB5EDBC0B04-low.png
ControlDescription
GUID-B4583F18-1D14-4FA4-8CE3-261F7A3E4A6F-low.png Manage ACP AssociationsOpens the Access Control Profile Associations Inventory
GUID-09D84EBE-8A20-4459-ADB8-C4FB89D8A69F-low.png Manage Authentication SpacesOpens the Access Control Authentication Spaces Inventory
GUID-EB7395E1-AD14-4E65-BBD2-A08FA5900CD1-low.png Manage ACPsOpens the Access Control Profiles Inventory
GUID-3170E5DC-E20D-4B99-8335-8BCB15B81D83-low.png Manage RolesOpens the Access Control Roles Inventory
GUID-B60FDAB6-0698-4849-9A06-7BDA2058EA2E-low.png Manage Resource GroupsOpens the Access Control Resource Groups Inventory

Access Control Profile Associations Inventory

This inventory details all defined ACP Associations. ACP Associations link individual users, groups of users, or all users in an entire authentication space to one or more Access Control Profiles. This in turn governs what activities users are able to perform within Protector, and on which resources.

Access Control Profile Associations Inventory
GUID-E1F272BF-DF5C-4F87-87D5-D0A347A2DEF3-low.png
ControlDescription
GUID-5B249BF3-CA3C-471D-BB85-9CBFAAFC1A9D-low.png SummarySelect the Summary option from the drop down menu in the Navigation Breadcrumbs to view the Access Control Summary.
GUID-2DB31664-7FB9-441F-8595-06A8E5A178EF-low.png EditEdits an existing ACP Association in the inventory. The Access Control Profile Association Wizard is launched to enable the ACP Association's attributes to be changed.
GUID-C06C9D94-4B99-4317-AFE8-EF7DB67C63CB-low.png DeleteEnabled only when one or more ACP Association is selected. Deletes the selected item from the inventory. The associated Authentication Space and ACP are not deleted.
AddCreates a new ACP Association. The Access Control Profile Association Wizard is launched to guide you through the process.
System generated ACP Association(s)At least one system generated ACP association is available when the product is installed. It associates an account chosen at installation time with a built-in ACP that provides the Protector Administrator role. This association cannot be deleted since it is necessary for initial login and configuration of access control by the application installer. System generated ACP Associations are marked with a GUID-4A766277-67FD-48D2-AEF7-AF06E238CDCE-low.png icon to indicate that they cannot be modified. The Access Control Profile Association Details is displayed to enable the association to be viewed.
User defined ACP Association(s)Any number of user defined ACP Associations can be created. These are displayed in the inventory and are marked with a Authentication Space, Group or User icon depending on whether the ACP is associated with an entire Authentication Space, a group or an individual user. ACP Associations must be defined in order to grant users access to the web and command line interfaces. The Access Control Profile Association Details is displayed to enable the association to be viewed and edited.
Filter on ACP Association NameFilters the displayed results based on the name.
Filter on TypeFilters the displayed results based on the association type:
  • All
  • GUID-09D84EBE-8A20-4459-ADB8-C4FB89D8A69F-low.png Authentication Space Association
  • GUID-2500B81C-A6A5-4A83-8792-6DC780E3B1FC-low.png Group Association
  • GUID-FF6FD25C-B3EF-48B7-ACAE-DB036FBA3280-low.png User Association
Access Control Profile Association Wizard
ACP Association Wizard - Specify name and description
GUID-9F465CE1-F2A6-46AB-AC2B-0B3E76B6BEE3-low.png
ControlDescription
NameEnter the name of the ACP association.
DescriptionOptional. Enter a short description of the ACP association.
ACP Association Wizard - Select user for this association (User)
GUID-812CA72F-A91F-4241-90A3-F3E9EB3EF102-low.png
TipA User ACP Association would typically be created to give individual users the highest level of access, e.g. Administrator or Security Manager ACP.
ControlDescription
User NameThe name of the user to associate with the ACP.
ACP Association Wizard - Select user for this association (Group)
GUID-250F3F97-1451-45DB-875F-0A7BF0981130-low.png
TipA Group ACP Association would typically be created to give management groups a high level of access.
ControlDescription
Authentication SpaceThe name of the Authentication Space from which the group is to be selected.

Enter or select an Authentication Space from the drop down list, then click Browse to view a list of Groups for an Authentication Space. The selected Group will be automatically entered in the Group Name field below.

Group NameThe name of the group to associate with the ACP.
Path to GroupProvide the path to the required OU, using '/' as the path delimiter.

For example, the following AD structure defines a Managers group within three different OUs:

  • Contoso.com
    • Accounts
      • Managers (Group)
      • Goods In (Group)
    • Engineering
      • Design
        • Managers (Group)
        • CAD Users (Group)
      • Test
        • Managers (Group)
        • QA Engineers (Group)

Here Path to Group must be set to one of the following, depending on which Managers group is required:

  • Accounts
  • Engineering/Design
  • Engineering/Test
ACP Association Wizard - Select user for this association (entire Authentication Space)
GUID-6C44D291-A331-4E88-8EA3-EB8AE6A43DDF-low.png
TipA Authentication Space ACP Association would typically be created to give everyone the most limited level of access, i.e. Operator ACP.
ControlDescription
Authentication SpaceThe name of the Authentication Space to associate with the ACPs.
NoteAll users and groups within the Authentication Space will be associated with the chosen ACPs.
ACP Association Wizard - Manage Association Profiles
GUID-8BE6E7DC-9A84-4B0F-BCA1-BBBF97AB4676-low.png
ControlDescription
Available ProfilesList of available Access Control Profiles listed. Click on one or more of the available ACPs to add them to the ACP Profile.
Selected ProfilesList of selected Access Control Profiles listed. Click on one or more of the selected ACPs to remove them to the ACP Profile.
Access Control Profile Association Details
ACP Association Details
GUID-7188F70B-7637-47BB-A4D3-B1DA64F3F61F-low.png
ControlDescription
GUID-2DB31664-7FB9-441F-8595-06A8E5A178EF-low.png EditLaunches the Access Control Profile Association Wizard to enable the group to be edited.
GUID-EB7395E1-AD14-4E65-BBD2-A08FA5900CD1-low.pngView Access Control ProfileClick on the link on the ACP tile to open the Access Control Profile Details to enable the ACPs to be viewed and edited.
GUID-EB7395E1-AD14-4E65-BBD2-A08FA5900CD1-low.png Role Click on the Role link on the ACP tile to open the Access Control Role Details to enable the Role to be viewed and edited.
Filter on Access Control Profile NameFilters the displayed ACPs based on the name.

Access Control Authentication Spaces Inventory

This inventory list all defined Authentication Spaces. These specify authentication services that Protector uses to authenticate users when they login.

Authentication Spaces Inventory
GUID-2828E327-0F54-49D7-8932-2DB7274117EE-low.png
ControlDescription
GUID-5B249BF3-CA3C-471D-BB85-9CBFAAFC1A9D-low.png SummarySelect the Summary option from the drop down menu in the Navigation Breadcrumbs to view the Access Control Summary.
GUID-2DB31664-7FB9-441F-8595-06A8E5A178EF-low.png EditEdits an existing Authentication Space in the inventory. The Access Control Authentication Space Wizard is launched to enable the Authentication Space's attributes to be changed.
GUID-C06C9D94-4B99-4317-AFE8-EF7DB67C63CB-low.png DeleteEnabled only when one or more Authentication Spaces is selected. Deletes the selected item from the inventory.
AddCreates a new Authentication Space. The Access Control Authentication Space Wizard is launched to guide you through the process.
System generated Authentication SpaceA system generated Authentication Space is available when the product is installed. It defines where the local administrator account(s) on the master machine is authenticated. This Authentication Space cannot be deleted since it is necessary for initial login and configuration of access control by the application installer. The system generated Authentication Space is marked with a GUID-4A766277-67FD-48D2-AEF7-AF06E238CDCE-low.png icon to indicate that it cannot be modified. Click on the name of the Authentication Space to open the Access Control Authentication Space Details.
OpenID Connect Authentication Space(s)When Protector is integrated with Hitachi Ops Center, an OpenID Connect Authentication Space is automatically created to support single sign-on. Click on the name of the Authentication Space to open the Access Control Authentication Space Details.
NoteOpenID Connect Authentication Spaces cannot be created via the UI.
User defined Authentication Space(s)Any number of user defined Authentication Spaces can be created. These are displayed in the inventory and can be based on Active Directory, Local Machine, RADIUS or Stand-alone LDAP authentication servers. Click on the name of the Authentication Space to open the Access Control Authentication Space Details.
GUID-B5E256D3-F815-49A9-8EA5-DC99F840B208-low.png Filter on Authentication Space NameFilters the displayed results based on the Authentication Space name.
Filter on TypeFilters the displayed results based on the Authentication Space server type.
Access Control Authentication Space Wizard

This wizard is launched when a new Authentication Space is added to the Authentication Spaces Inventory.

Authentication Space Wizard - Specify name and description
GUID-F174A975-44BC-4044-A163-B8A7F53F3FBE-low.png
ControlDescription
NameEnter a name for the Authentication Space.
DescriptionOptional. Enter a short description of the Authentication Space.
Authentication Space Wizard - Active Directory
GUID-62542FCA-DF79-4BDF-AA7C-F3C81994EB6C-low.png
ControlDescription
ProxyType or select a Protector node that has a connection to the required Active Directory Service.
NoteThe AD Proxy must be a Windows node.
TipTo avoid the proxy becoming a single point of failure for authentication, select a clustered node where possible.
Active Directory Domain NameEnter the AD domain name, e.g. Contoso.com
Authentication Space Wizard - OS Accounts
GUID-73EF440B-4F34-4049-A48C-74D6620F0E71-low.png
ControlDescription
Authentication NodeType or select a Protector node that will provide local authentication using the OS's authentication service.
Authentication Space Wizard - RADIUS
GUID-15C72A2E-1285-4F94-87B2-BD50CBA8229D-low.png
ControlDescription
ProxyType or select a Protector node that has a connection to the required RADIUS server.
Host Name / IP AddressSpecify the IP address or DNS resolvable name of the required RADIUS server.
PortSpecify the IP port number or use the default port number (1812).
Secret KeySpecify the Secret Key for the RADIUS server.
TimeoutSpecify the timeout period in seconds.
Retry CountSpecify the number of times a retry should be performed.
Authentication Space Wizard - LDAP
GUID-85376E6D-8392-48E0-BB9A-E495F36D64BB-low.png
ControlDescription
ProxyType or select a Protector node that has a connection to the required LDAP server.
Note
  • The LDAP Proxy must be a Linux node.
  • An LDAP Authentication Space cannot be used to authenticate via Microsoft Active Directory, despite similarities between the two technologies.
Server URIEnter the URI of the required LDAP server in the format ldap://domain or ldaps://domain
Server PortEnter the LDAP server port number if different from the default value. The default is 636 when connecting over SSL, otherwise it is 389.
Base DNEnter the base Distinguished Name from which searches are performed.

The default account distinguished name (DN) with which to perform initial searches. This is in LDAP DN format (e.g. cn=Admin, ou=Users, dc=mydomain, dc=com)

The default account is needed to perform a lookup of a user's DN from their UID. Users log into Protector with a UID (e.g. bmortimer@mydomain.com) but the user's DN is needed for the LDAP bind and it is found using this account.

If this value is not supplied the LDAP server must support anonymous bind.

Bind UsingSelect how to bind to the server:
  • Use anonymous bind
  • Bind using specified account - enter the credentials below
Bind Account DNEnabled only if Bind using specified account is selected. Enter the default account with which to perform searches.
Bind Account PasswordEnabled only if Bind using specified account is selected. The default account password.

This will be stored in an encrypted form within Protector until needed.

If not set the server must support anonymous bind.

TLS ConfigurationClick to specify TLS configuration options. See below.
Advanced ConfigurationClick to specify advanced configuration options. See below.
TLS Configuration
GUID-BF921B2A-54DC-471C-A694-B32349E19793-low.png
ControlDescription
TLS Request Certificate CheckThe TLS configuration in LDAP validates the way the Protector client treats the server certificate:
  • Never - Least Secure. No certificate is requested. The Protector client will allow the use of self-signed certificates from the server.
  • Allow - A certificate is requested. The TLS session completes normally even if a bad certificate or no certificate is provided.
  • Try - A certificate is requested. The TLS session completes normally even if no certificate is provided. However if a bad certificate is provided, TLS session terminates.
  • Demand - Hard Secure. This is the default setting. A certificate is requested. The TLS session terminates if a bad certificate or no certificate is provided. The LDAP server's certificate must be valid and signed by a trusted CA.
TLS CA Certificate DirectorySpecifies path to the directory containing CA certificate files for the server.
TLS CA Certificate FileSpecifies the CA certificate file for the server.
Advanced Configuration
GUID-D235327E-FDE4-4A59-9726-8C72370571E3-low.png
ControlDescription
Person FilterEnter a search filter in RFC 2254 format to look up users.
Group FilterEnter a search filter in RFC 2254 format to look up groups.
Group StrategySpecifies the group look up strategy of the LDAP server:
  • Groups know users - Each group knows its members, which are found using member attributes.
  • Users know groups - Each user knows its groups.
Group Member attributeUsed to look for a group’s users or a user’s groups.
Group Member TypeSpecifies value type stored in Group Member attribute:
  • Member value contains a DN
  • Member value contains a UID
CN AttributeName of the attribute holding Common Name (CN).
DN AttributeName of the attribute holding Distinguished Name (DN).
UID attributeThe number of the attribute holding the user ID with the default UID.
Access Control Authentication Space Details

This page displays the details of an Access Control Authentication Space and enables you launch the wizard to edit them.

Authentication Space Details
GUID-DD510082-B034-4C06-9EE9-5F931D645302-low.png
ControlDetails
GUID-2DB31664-7FB9-441F-8595-06A8E5A178EF-low.png EditLaunches the appropriate Access Control Authentication Space Wizard to enable the Authentication Space to be edited

Access Control Profiles Inventory

This inventory lists all defined Access Control Profiles (ACPs). These associate Roles to Resource Groups thus controlling what activities are allowed on each resource.

Access Control Profiles Inventory
GUID-0BD92FE9-B22C-4B91-81AC-DC7B4A60BD5C-low.png
ControlDescription
GUID-5B249BF3-CA3C-471D-BB85-9CBFAAFC1A9D-low.png SummarySelect the Summary option from the drop down menu in the Navigation Breadcrumbs to view the Access Control Summary.
GUID-2DB31664-7FB9-441F-8595-06A8E5A178EF-low.png EditEdits an existing ACP in the inventory. The Access Control Profile Wizard is launched to enable the ACP's attributes to be changed.
GUID-4934ED1F-7176-41FD-9A68-8E7A31208F18-low.png CloneEnabled only when one or more ACPs is selected. Creates a clone of the selected item which can then be modified. The clone is a shallow copy, in that it references the same Role and Resource Groups as the original.
GUID-C06C9D94-4B99-4317-AFE8-EF7DB67C63CB-low.png DeleteEnabled only when one or more ACP Association is selected. Deletes the selected item from the inventory. The associated Role and Resource Groups are not deleted.
AddCreates a new ACP. The Access Control Profile Wizard is launched to guide you through the process.
GUID-EB7395E1-AD14-4E65-BBD2-A08FA5900CD1-low.png System generated ACPsAt least one system generated ACPs are available when the product is installed. This associates system generated role Protector Administrator, with the default resource group. These ACPs cannot be deleted since they provide a basic level of access control. System generated ACPs are marked with a GUID-4A766277-67FD-48D2-AEF7-AF06E238CDCE-low.png icon to indicate that they cannot be modified. The Access Control Profile Details is displayed to enable the permissions to be viewed.
GUID-EB7395E1-AD14-4E65-BBD2-A08FA5900CD1-low.png User defined ACP(s)Any number of user defined ACPs can be created. These are displayed in the inventory. ACPs should be defined in order to grant the required level of access to groups of resources as appropriate to the users' responsibilities. The Access Control Profile Details is displayed to enable the permissions to be viewed and edited.
Filter on Access Control Profile NameFilters the displayed results based on the Access Control Profile Name.
Access Control Profile Wizard

This wizard is launched when a new ACP is added to the Access Control Profiles Inventory.

Access Control Profile Wizard - Specify name and description
GUID-904DF755-AD47-421A-8CAA-82D1AD139BDA-low.png
ControlDescription
NameThe name of the Access Control Profile.
DescriptionOptional. A short description of the ACP.
Access Control Profile Wizard - Select the ACP Role
GUID-45C72520-9698-4166-BE9F-4801C4D4FE3B-low.png
ControlDescription
RoleSelect the role from the drop down list. The chosen role determines what activities owners of this ACP will be able to perform.
Access Control Profile Wizard - Select the ACP Resource Groups
GUID-BEA8E991-04C0-4E98-AAE3-C5EA72676A7B-low.png
ControlDescription
Available Resource GroupsList of available Resources Groups. Click on one or more of the available Resource Groups to add them to the ACP.
Selected Resource GroupsList of selected Resources Groups. The role chosen in the previous page of the wizard can be performed on these resources. Click on one or more of the Resource Groups to remove them from the ACP.
Access LevelSelect the required Access Level from the dropdown list to the right of the Selected Resource Groups entry. The access level controls visibility of backups (including any logs or reports relating to that backup) on storage nodes within the resource group as follows:
  • LIMITED - a backup is visible if it originated from a node in the resource group.
  • FULL - all backups, regardless of where they originated, are visible on any storage nodes within the resource group.
NoteThe access level only controls the visibility. What a user is able to do with visible backups is dependent on the activities they are allowed to perform on them.

A user given LIMITED access to a storage destination included in their resource group will only see log messages for that storage destination if they pertian to their backups. A user given FULL access level will see all log messages for that destination.

Access Control Profile Details

This page displays the details of an Access Control Profile and enables you launch the wizard to edit them.

Access Control Profile Details
GUID-CCD17018-95FD-4B47-AFF3-25DD0A292D34-low.png
ControlDescription
GUID-2DB31664-7FB9-441F-8595-06A8E5A178EF-low.png EditLaunches the Access Control Profile Wizard to enable the ACP to be edited.
RoleClick on the role name link to open the Access Control Role Details.
GUID-B60FDAB6-0698-4849-9A06-7BDA2058EA2E-low.png Resource GroupsClick on View Resource Group link on a tile to open the Access Control Resource Group Details.
Filter on Resource NameFilters the displayed resources groups.

Access Control Roles Inventory

This inventory lists all defined Roles. These roles define what activities are allowed to be performed.

Roles Inventory
GUID-3A8134EB-1136-46D0-9355-77F8E2641691-low.png
ControlDescription
GUID-5B249BF3-CA3C-471D-BB85-9CBFAAFC1A9D-low.png SummarySelect the Summary option from the drop down menu in the Navigation Breadcrumbs to view the Access Control Summary.
GUID-2DB31664-7FB9-441F-8595-06A8E5A178EF-low.png EditEdits an existing Role in the inventory. The Access Control Role Wizard is launched to enable the Role's attributes to be changed.
GUID-4934ED1F-7176-41FD-9A68-8E7A31208F18-low.png CloneEnabled only when one Role is selected. Creates a clone of the selected item which can then be modified.
GUID-C06C9D94-4B99-4317-AFE8-EF7DB67C63CB-low.png DeleteEnabled only when one or more Roles are selected. Deletes the selected item from the inventory.
AddCreates a new Role. The Access Control Role Wizard is launched to guide you through the process.
GUID-3170E5DC-E20D-4B99-8335-8BCB15B81D83-low.png System generated RolesAt least three system generated Roles are available when the product is installed. They define default administrator, security manager and user roles. These roles cannot be deleted since they provide a basic level of access control. System generated roles are marked with a GUID-4A766277-67FD-48D2-AEF7-AF06E238CDCE-low.png icon to indicate that they cannot be modified. The Access Control Role Details is displayed to enable the permissions to be viewed.
GUID-3170E5DC-E20D-4B99-8335-8BCB15B81D83-low.png User defined Role(s)Any number of user defined Roles can be created. These are displayed in the inventory. Roles should be defined in order to grant the required level of functionality appropriate to the users' responsibilities. The Access Control Role Details is displayed to enable the permissions to be viewed and edited.
Filter on Role NameFilters the displayed results based on the Role Name.
Access Control Role Wizard

This wizard is launched when a new Role is added to the Roles Inventory.

Role Wizard - Specify name and description
GUID-1B1368E3-445E-419C-AFA6-9B5161C9A56A-low.png
ControlDescription
NameThe name of the Role.
DescriptionOptional. A short description of the Role.
Role Wizard - Select Activity Groups and Activities
GUID-FAB826BE-1F49-47FD-AE5C-C8F6642F0EA4-low.png
ControlDescription
Activity GroupsActivity Groups contain a set of functionally cohesive Activities that are typically applied to a Role en-mass.

Click the + button to the left of an Activity Group to expand and view the activities within a group.

Click the checkbox to the left of an Activity Group to apply or remove all Activities within that group for the Role.

Click the checkbox to the left of an Activity to apply or remove that Activity for the Role.

The check box to the left of an Activity Group displays a '-' instead of a tick if only some of the Activities in the group have been applied.

Refer to Controlling access to UI features with Activities and Activity Groups for details on how each activity affects access to the UI.

NoteThe Override Ownership Permissions activity within the Permissions activity group allows users with this activity to view Policies, Dataflows, Destination Templates and Schedules regardless of who created them or who they are assigned to.

Enable this permission with care.

ActivitiesActivities define what a user can do within Protector via the UI and via the REST API. Click the checkbox to the left of an Activity to apply or remove the activity for the Role.
Access Control Role Details

This page displays the details of a Role and enables you to launch the wizard to edit them.

Role Details
GUID-946DC383-5BDA-44EA-BD60-2B69319BB7BA-low.png
ControlDescription
GUID-2DB31664-7FB9-441F-8595-06A8E5A178EF-low.png EditLaunches the Access Control Role Wizard to enable the role to be edited.
Controlling access to UI features with Activities and Activity Groups

Access to Protector features is controlled by the Activity Groups and Activities assigned to the user. Access to a feature can be:

  • Denied completely by disabling all activities
  • Set to read-only by enabling only View activities (e.g. View Policies)
  • Set to full control by enabling Manage activities (e.g. Manage Policies)
  • Set to enable specific functionality within some features (e.g. Trigger Operations enables policies to be triggered from the Monitor page)

The following table lists the features available in Protector, along with the Activity Groups that control general access to those features. Fine grain access control to specific functions within a feature can be achieved by enabling or disabling specific Activities.

User Interface PageActivity GroupActivity
Pages accessible from the Main Banner:
DashboardRefer to Logs, Jobs, Nodes, Monitor, Policies, Data Flows and Licenses below.
JobsMonitoringView Jobs
Manage Jobs
LogsLogsView Logs
Manage Logs
Purge Audit Logs
Verify Audit Logs
NotificationsView Log Notifications
Manage Log Notifications
MonitorMonitoringView Node Statistics
TriggeringTrigger Operations
StorageHardware StorageManage Hardware.
NoteEnabling this option will automatically enable all other activities in this activity group regardless of their current state.
Manage Hardware Snapshots and Clones
Mount Hardware Snapshots and Clones
Pause Hardware Replications
Revert Hardware Snapshots
Swap Hardware Replications
View Hardware
RepositoriesView Repositories
Use Repositories
Manage Repositories
ReportsReportsView Reports
Manage Reports
Pages accessible from the Sidebar:
NodesNodesView Source Nodes
Manage Source Nodes
View Storage Nodes
Manage Storage Nodes
Software UpdatesView Software Updates
Manage Software Updates
Node GroupsNodesView Source Nodes
Manage Source Nodes
View Storage Nodes
Manage Storage Nodes
PoliciesPoliciesView Policies
Manage Policies
Data FlowsDataflowsView Dataflows
Manage Dataflows
View Destination Templates
Manage Destination Templates
RulesManage Rules
SchedulesSchedulesView Schedules
Manage Schedules
NotificationsNotificationsView Notification Settings
Manage Notification Settings
RestoreRestorePerform Restores
Access ControlAuthenticationView Authentication Spaces
Manage Authentication Spaces
AuthorizationView RBAC Configuration
Manage RBAC Configuration
LicencesLicencesView Licenses
Manage Licenses
<Item> PermissionsPermissionsOverride Ownership Permissions
Note

If a user does not have the required Activity Group or Activity assigned to them via a Role then the user interface will prevent the user performing the activity or viewing information in one or more of the following ways:

  • Suppressing display of the associated controls.
  • Overlaying a warning triangle icon within the associated controls.
  • Displaying an Access Denied hover hint when the user moves the cursor over the associated controls.
  • Displaying an Access Denied message where the associated information would normally appear on a page, wizard or dialog.
  • Displaying an Access Denied pop-up Session Notification when the request is denied by the back-end handler code.

Access Control Resource Groups Inventory

This inventory lists all defined Resource Groups. Resource Group are created to define logical groups of computing resources in the context of access control. They are distinct from Node Groups which are created to help define policies.

Resource Groups Inventory
GUID-00369F61-1E13-40A4-BC1F-43772A6FA1D7-low.png
ControlsDescription
GUID-5B249BF3-CA3C-471D-BB85-9CBFAAFC1A9D-low.png SummarySelect the Summary option from the drop down menu in the Navigation Breadcrumbs to view the Access Control Summary.
GUID-2DB31664-7FB9-441F-8595-06A8E5A178EF-low.png EditEdits an existing Resource Group in the inventory. The Access Control Resource Group Wizard is launched to enable the Resource Group's attributes to be changed.
GUID-4934ED1F-7176-41FD-9A68-8E7A31208F18-low.png CloneEnabled only when one Resource Group is selected. Creates a clone of the selected item which can then be modified.
GUID-C06C9D94-4B99-4317-AFE8-EF7DB67C63CB-low.png DeleteEnabled only when one or more Resource Groups is selected. Deletes the selected item from the inventory. The associated Nodes are not deleted.
AddCreates a new Resource Group. The Access Control Resource Group Wizard is launched to guide you through the process.
GUID-B60FDAB6-0698-4849-9A06-7BDA2058EA2E-low.png System generated Resource GroupOne system generated Resource Group is available when the product is installed. All nodes that are listed in the Nodes Inventory are automatically added to this default resource group. This resource cannot be deleted since it provides a basic level of access control. System generated Resource Groups are marked with a GUID-4A766277-67FD-48D2-AEF7-AF06E238CDCE-low.png icon to indicate that they cannot be modified. The Access Control Resource Group Details is displayed to enable the permissions to be viewed.
GUID-B60FDAB6-0698-4849-9A06-7BDA2058EA2E-low.png User defined Resource Group(s)Any number of user defined Resource Groups can be created. These are displayed in the inventory. Resource Groups should be defined in order to restrict access to nodes. The Access Control Resource Group Details is displayed to enable the permissions to be viewed and edited.
Filter on Resource Group NameFilters the displayed results based on the name.
Access Control Resource Group Wizard

This wizard is launched when a new Resource Group is added to the Resource Groups Inventory.

Resource Group Wizard - Specify name and description
GUID-3D038ADE-259C-4D0A-BBD2-42341361BED4-low.png
ControlDescription
NameEnter the name of the resource group.
DescriptionOptional. Enter a short description of the resource group.
Resource Group Wizard - Manage Resources
GUID-E14F8450-BD48-431B-BBDC-7FCE37F6CD43-low.png
ControlDescription
Resource NameSearches for the resource by name.
Available ResourcesLists the available resources. Click on the name of the resource to add to the selected resource list.
NoteIf the Master node is included in a resource group then users with access to that group will also have access to administrative log messages. Access to the Master node should only be granted to administrative users.
Selected ResourcesLists the selected resources. Click on the name of the resource to remove it from the selected resource list.
Access Control Resource Group Details

This page displays the details of a Resource Group and enables you launch the wizard to edit them.

Resource Groups Details
GUID-FBBBD649-F893-4A97-A280-3B2C77A157AD-low.png
ControlDescription
EditLaunches the Access Control Resource Group Wizard to enable the group to be edited.
Filter on Resource NameFilters the displayed results based on name.

Access Control Summary

This page displays Access Control settings for each user or group configured within Protector.

Access Control Summary
GUID-3C2E9A32-B84B-4DF5-BFC6-AE7EAE5F1E7E-low.png
Tree NodeDescription
ACP Association NameEach ACP Association defined within Protector is listed by name. Click [+] to view the related ACPs.
ACP NameShows the related ACPs below the ACP Association. Click [+] to view the related Role and Resource Groups.
Role NameShows the related Role below the ACP. Click [+] to view the related Activity Groups and Activities
Activity Group NameShows the related Activity Groups below the Role. Click [+] to view the related Activities.
Activity NameShows the related Activities below the Activity Group.
Resource Group NameShows the related Resource Groups below the ACP. Click [+] to view the related Resources.
ResourceShows the related Resources below the Resource Group.

Access Control Permissions Inventory

The Permissions Inventory is accessed via the Edit Permissions button on various items within the Web UI including policies, data flows and schedules. It enables read/write access for those items to be granted to specific users and groups.

Permissions Inventory
GUID-7085F41F-8DD4-4227-92E5-227FEA81E889-low.png
ControlDescription
GUID-2DB31664-7FB9-441F-8595-06A8E5A178EF-low.png EditEdits an existing permission in the inventory. The Access Control Permissions Wizard is launched to enable the policy's attributes to be changed.
GUID-C06C9D94-4B99-4317-AFE8-EF7DB67C63CB-low.png DeleteEnabled only when one or more permissions is selected. Deletes the selected item from the inventory.
AddAdds a new permission. The Access Control Permissions Wizard is launched to guide you through the process.
GUID-6B363DCE-3699-4730-A0EE-E3237A04681E-low.png Default PermissionBy default the system adds the administrator@master user permission to controlled items and grants READ/WRITE access. The default permission provides a basic level of access control. The Access Control Permissions Wizard is launched to enable the permissions to be edited.
GUID-6B363DCE-3699-4730-A0EE-E3237A04681E-low.png User defined Permission(s)Any number of user defined permission(s) can be added. These are displayed in the inventory. Permissions should be defined in order to grant the required level of access to Policies, Data Flows and other items as appropriate to the users' responsibilities. The Access Control Permissions Wizard is launched to enable the permissions to be edited.

Access Control Permissions Wizard

This wizard is launched when a new user or group is added to the Permissions Inventory.

Permissions Wizard - User Permission
GUID-BE14DF26-2F3D-4475-A2AD-09FF50CFE2A7-low.png
ControlDescription
User NameEnter the user name and Authentication Space (username@AuthenticationSpace) or click Browse to lookup the Authentication Space and user.
Read AccessGrants Read access to the item.
Write AccessGrants Create, Read, Update and Delete access to the item.
Permissions Wizard - Group Permission
GUID-E12DDBA6-7287-41E4-8D7A-A2C8A3167CC5-low.png
ControlDescription
Authentication SpaceSelect the Authentication Space from the dropdown list or click Browse to lookup the Authentication Space and group.
NameEnter the group name. This will be populated automatically if you click Browse.
Path of GroupIf the group name is not unique between different organisational units (OUs) in the same Authentication Space, then enter the path to the group you are referring to using '\' as delimiter.
Read AccessGrants the group READ access to the item.
Write AccessGrants the group CREATE, READ, UPDATE and DELETE access to the item.

Access Control Transfer Permissions Dialog

This dialog is displayed when the permissions for a resource are being tranferred from the current owner to new owner.

Transfer RBAC Permissions Dialog
GUID-ED54E9B7-9D7B-4261-A7D4-018047BD5321-low.png
ControlDescription
NodeSelect the node that will become the owner of this resource.

Access Control Tasks

This section describes access control tasks that users will perform with Ops Center Protector.

For further information, refer to:

How to configure basic role based access control

Before you begin

You will need to have:

  • A Protector account with Default Administrator ACP authority. You will already have a <Username>@Master login with this authority if you installed Protector on the Master node. If you do not have an account with this authority then you will need to request one from your Protector administrator.
  • Knowledge of users and user groups who require access to Protector and their data protection roles and responsibilities.
  • The details of any authentication services that you intend to use to authenticate Protector users (e.g. Active Directory, LDAP, RADIUS etc.)

Refer to Access Control Concepts and Access Control UI Reference for further information.

Protector implements RBAC to control what actions users can perform on which resources. The RBAC implementation is extremely flexible and can be configured to be as open or restrictive as an organization demands.

This procedure will allow you to get up and running quickly, however to fully utilize RBAC's features you will need to setup a more advanced RBAC implementation. Refer to How to configure advanced role based access control for details on how to do this.

Protector includes the following built-in access control objects:

  • The 'default' Resource Group that all Protector nodes are a member of by default.
  • The Roles:
    • Protector Admin that can perform all activities.
    • Protector Security Manager that can perform all access control activities.
    • Protector Operator that can view all resources and perform restore activities.
  • The Access Control Profile:
    • Default Administrator that can perform all activities on all (default) resources.
  • The 'Master' Authentication Space that represents the local authentication service on the Master node's OS.
  • The following Access Control Profile Association (depending on the UserName of the account on the Master node specified when Protector was installed):
    • <UserName>@Master that represents a user that has Default Administrator privileges.

This topic explains how to implement a basic RBAC policy:

Procedure

  1. Use a web browser to log on to the Protector user interface at: https://<Master>, where <Master> is the IP address or DNS name of the Master node.

    The Login Page will be displayed.
  2. Enter the username <UserName>@master and the associated password to log in with Default Administrator privileges.

  3. Click the Access Control link on the Navigation Sidebar to open the Access Control Dashboard.

  4. Create an Authentication Space that represents your organization's existing authentication service (see How to create an Authentication Space).

  5. Create ACP Associations for each user, group or entire authentication space that requires access to Protector, using one of the built-in Access Control Profiles (see How to create an Access Control Profile Association).

    You can create your own ACPs or clone an existing ACP and make changes to the clone (see How to create an access control profile and How to clone an access control profile).
  6. It is recommended that the default ACP Association <UserName>@master is replaced with your own ACP associations, using dedicated usernames created in your organization's domain.

    The default ACP Association cannot be deleted, but can be rendered unusable when the corresponding local Windows account is disabled. In the event that administrators are locked out from Protector due to access control configuration issues, this ACP Association is available as a way back in, by re-enabling the local Windows account.
    Caution
    • The default ACP Association is generated automatically when Protector is installed, to enable initial configuration of access control features. This is based on the local Windows account specified during installation.
    • The default <Username>@Master ACP association should be assigned to a user with the specific responsibility as the primary Protector administrator, to ensure security is not compromised.
    • Access to the Master node should be strictly controlled to prevent malicious access to the Protector executables and associated configuration data.

How to configure advanced role based access control

Before you begin

You will need to have:

  • A Protector account with Default Administrator authority. You will already have an <Username>@master login with this authority if you installed Protector on the Master node. If you do not have an account with this authority then you will need to request one from your Protector administrator.
  • A good understanding of your organization's computing resources and the way they are managed and grouped into departments.
  • Knowledge of where computing resource will be backed up to (i.e. the storage devices to be used).
  • Knowledge of users and user groups who require access to Protector and their data protection roles and responsibilities.
  • The details of any authentication services that you intend to use to authenticate Protector users (e.g. Active Directory, LDAP, RADIUS etc.)

Refer to Access Control Concepts and Access Control UI Reference for further information.

Protector implements Role Based Access Control (RBAC) to ensure that only those users with sufficient privileges can view or modify resources. The RBAC implementation is extremely flexible and can be configured to be as open or restrictive as an organization demands.

If you require only a basic RBAC implementation then refer to How to configure basic role based access control

Alternatively, custom roles and resource groups can be created that precisely control the nodes that are visible and the operations that can be performed on them. This topic explains how to plan and implement a custom RBAC policy:

Procedure

  1. Identify the computing resources within your organisation, based on geographical, divisional, departmental, functional and project groupings.

    These resources may be managed locally and/or centrally and this will also dictate how they are grouped together, for the purposes of access control when:
    • Designing data protection policies and data flows
    • Monitoring and reporting Protector performance
    • Allocating and monitoring backup storage resources
    • Auditing for compliance
    • Administrating security and access controls
    • Repurposing data for test and development
    • Executing restore and disaster recovery procedures

    For example, you might need to create the following resource groups in addition to the built-in default group:

    (The names in this example are designed only to help illustrate how the RBAC objects are assembled into hierarchies).

    • groupAccountsGlobal
    • groupLegalGlobal
    • groupHumanResourcesUS
    • groupHumanResourcesUK
    • groupDevelopmentUK
    • groupProductionPrimaryUS
    • groupProductionSecondaryUS

    For guidance, refer to How to create a resource group.

  2. Identify the generic roles (not the individuals) required within your organisation for administering computing resources and the associated data protection processes.

    For example, you might need to create the following roles based on, or in addition to, the built-in roles:
    • roleBackupAdmin
    • roleComplianceAuditor
    • roleSecurityAdmin
    • roleDevelopmentLead
    • roleProtectorUser
  3. Define precisely what activities each role should and should not be able to perform.

    Protector defines numerous Activity Groups that are cohesive collections of Activities. Normally a role would be assigned all activities in a group, however individual activities can be assigned if fine grain control is required. For example, the Logs Activity Group contains the following Activities which can be granted to a role en-mass or individually:
    • View Logs
    • Manage Logs
    • Purge Audit Logs
    • Verify Audit Logs

    For guidance on configuring Roles and their associated Activities, refer to How to create a role.

  4. Create Access Control Profiles based on the Resource Groups and Roles identified above. These ACPs combine a Role with one or more Resource Groups.

    For example, it might be necessary to create the following ACPs, in addition to the built-in Default Administrator ACP:
    • acpAccountsBackupAdmin

      - to allow roleBackupAdmin access to groupAccountsGlobal

    • acpLegalBackupAdmin

      - to allow roleBackupAdmin access to groupLegalGlobal

    • acpDevelopmentBackupAdmin

      - to allow roleBackupAdmin access to groupDevelopmentUK

    • acpProductionBackupAdmin

      - to allow roleBackupAdmin access to groupProductionPrimaryUS and groupProductionSecondaryUS

    • acpDevelopmentUser

      - to allow roleProtectorUser access to groupDevelopmentUK

    For guidance on associating Roles with Resource Groups, refer to How to create an access control profile.

  5. Identify how users will be authenticated by Protector.

    Protector supports a number of authentication protocols. If your organization has an established AD, LDAP or RADIUS authentication service or uses local accounts, then these can be used.

    For example, it might be necessary to create the following user and group accounts:

    • Donald McPhee has a UID (User ID) of donald.mcphee in the Active Directory authentication service global.widgetdev.com.

      An Authentication Space is created named widgetdev that refers to that AD service. He logs into Protector with the UPN (User Principal Name) donald.mcphee@widgetdev.

    • Pete Traynor has a UID of traynorp in the local OS Account on the Protector node WIN7-PCEA45.

      An Authentication Space is created named WIN7-PCEA45 that refers to that node. He logs in with the UPN traynorp@WIN7-PCEA45.

    • Sarah Dean has a UID of svpdean in the RADIUS service uk.widgetdev.com.

      An Authentication Space is created named uk.widgetdev that refers to that RADIUS service. She logs into Protector with the UPN svpdean@uk.widgetdev.

    • The contract development team members are in a user group that has a UID of devteam in the LDAP authentication service datadevs.biz.

      An Authentication Space is created named datadevs that refers to that LDAP service. They log in using the UPN devteam@datadevs

    For guidance, refer to How to create an Authentication Space.

  6. Associate authenticated users and user groups with Access Control Profiles (i.e. Roles and Resource Groups) so that those users are able to log on to Protector, access the resources they need and carry out the activities their roles allow.

    An individual user can be associated with more than one ACP, and an ACP can be assumed by more than one user.

    For example the following ACP Associations are required:

    • donald.mcphee@widgetdev and svpdean@uk.widgetdev are authorized to perform the activities defined by acpDevelopmentBackupAdmin on its associated resources.
    • svpdean@uk.widgetdev is, in addition, authorized to perform the activities defined by acpProductionBackupAdmin on its associated resources.
    • The entire database development team devteam@datadevs are authorized to perform the activities defined by acpDevelopmentUser on its associated resources.
    • traynorp@WIN7-PCEA45 is authorized to perform the activities defined by acpAccountsBackupAdmin and acpLegalBackupAdmin on its associated resources.

    For guidance on authorizing users with their respective Roles and Resource Groups, refer to How to create an Access Control Profile Association.

  7. It is recommended that the default ACP Association <username>@master is replaced with your own ACP associations, using dedicated usernames created in your organization's domain.

    Caution
    • The default ACP Association is generated automatically when Protector is installed, to enable initial configuration of access control features. This is based on the local Windows account specified during installation. Best practice states that local accounts should be disabled on the Master to reduce security vulnerabilities.
    • The default <Username>@Master ACP association should be assigned to a user with the specific responsibility as primary Protector administrator, to ensure security is not compromised.
    • Access to the Master node should be strictly controlled to prevent malicious access to the Protector executables and associated configuration data.

How to create a resource group

Before you begin

Refer to How to configure advanced role based access control which describes how resource groups are used in configuring access control.

To create a resource group:

Procedure

  1. From the Access Control Dashboard click Manage Resource Groups to open the Access Control Resource Groups Inventory.

  2. Click the Create new item tile to open the Access Control Resource Group Wizard.

  3. Enter a Name for the resource group and a Description, then click Next.

  4. Select the resources to be included in the resource group from the left-hand list by clicking on each resource.

    Each resource selected is added to the right-hand list. Resources can be removed from the right-hand list by selecting them there.
  5. Click Finish to close the wizard and return to the inventory.

How to create a role

Before you begin

Refer to How to configure advanced role based access control which describes how roles are used in configuring access control.

To create a role:

Procedure

  1. From the Access Control Dashboard click Manage Roles to open the Access Control Roles Inventory.

  2. Click the Create new item tile to open the Access Control Role Wizard.

  3. Enter a Name and Description for the role, then click Next.

  4. Select the activity groups to apply to the role by clicking the checkbox to the left of the activity group names.

  5. To apply individual activities, click the + to the left of the activity group name to expand the group, then select the required activities by clicking the checkbox to the left of the activity names

  6. Click Finish to close the wizard and return to the inventory.

How to create an access control profile

Before you begin

Refer to How to configure advanced role based access control which describes how access control profiles are used in configuring access control.

Ensure that the necessary resource groups and roles have been created (see How to create a resource group and How to create a role).

To create an access control profile:

Procedure

  1. From the Access Control Dashboard click Manage ACPs to open the Access Control Profiles Inventory.

  2. Click the Create new item tile to open the Access Control Profile Wizard.

  3. Enter a Name and Description for the role, then click Next.

  4. Select the required Role from the menu, then click Next.

  5. Select the resource groups to be included in the access control profile from the left hand list by clicking on each resource group.

    Each resource group selected is added to the right hand list. Resource groups can be removed from the right-hand list by selecting them there.
  6. For each resource group included in the ACP, set the Access Level in the dropdown control to the right of the resource group in the right hand list.

    The access level controls the visibility of backups of nodes in the resource group.
  7. Click Finish to close the wizard and return to the inventory.

How to clone an access control profile

Before you begin

Refer to How to configure advanced role based access control which describes how access control profiles are used in configuring access control.

NoteA cloned access control profile is a point-in-time copy as opposed to inheritance of a parent access control profile. If you modify the original, none of those changes will be reflected in the clone.

Cloning is a way of creating a new ACP, based on an existing ACP. To clone an access control profile:

Procedure

  1. From the Access Control Dashboard click Manage ACPs to open the Access Control Profiles Inventory.

  2. Select the tile for the ACP you want to clone, then click Clone in the menu above.

    A clone of the ACP will be added to the inventory having the same name but with (clone) appended.
  3. To rename the clone refer to How to edit an access control profile.

How to edit an access control profile

You can make changes to an existing access control profile as follows:

Procedure

  1. From the Access Control Dashboard click Manage ACPs to open the Access Control Profiles Inventory.

  2. Click on the name of the ACP you want to edit.

    The Access Control Profile Details opens, showing the associated role and resource groups.
  3. Click on the Edit button in the top right corner of the page.

    The Access Control Profile Wizard opens.
  4. Edit the parameters as required, clicking Next and Previous to locate the items to edit.

  5. When you have finished editing, go to the final page of the wizard and click Finish.

    The wizard is closed and the details page is displayed showing the updated parameters.

How to create an Authentication Space

Before you begin

Refer to How to configure basic role based access control or How to configure advanced role based access control which describes how Authentication Spaces are used in configuring access control.

Protector communicates with an authentication server via a single proxy node, which is specified when the access control Authentication Space is created. Ensure that the following prerequisites are met before you configure an AD, RADIUS or LAPD Authentication Space in Protector:
  • The Protector proxy (which can be a Client or Master node) connecting to the authentication server is registered with it and any prerequisites listed in the authentication server documentation are met.
  • The authentication server is not blocked by any firewalls.
  • The configuration parameters for type of authentication server selected are known. See Access Control Authentication Space Wizard for what is required for each server type.

To create an Authentication Space:

Procedure

  1. From the Access Control Dashboard click Manage Authentication Spaces to open the Access Control Authentication Spaces Inventory.

  2. Click the Create new item tile to open the Access Control Authentication Space Wizard.

  3. Enter a Name and Description for the Authentication Space, then click Next.

    NoteFor Active Directory, the Name must be the AD Domain Name.
  4. Select the type of Authentication Space you require from the list on the left of the wizard.

    The parameters appropriate to the Authentication Space type selected are displayed on the right of the wizard. All Authentication Space types require a Proxy to be selected, (except OS Accounts, which require an Authentication Node) that actually holds the account information.
  5. Enter the parameters required for the selected Authentication Space type, then click Finish.

How to configure an LDAP authentication space

Before you begin

Ensure the LADPv3 server is correctly configured as per the instructions supplied with the LDAP software.

Configure a Linux based Protector (Master or Client) node with a connection to the LDAP server to act as a proxy. If you have a Windows Master, then you must select a Linux Client as a proxy. In this example the node Client5RHEL will be nominated as the proxy.

If using LDAP over TLS, place the TLS CA certificate file on the Protector proxy node.

NoteProtector supports LDAP and LDAP over TLS (LDAPS) protocols. We recommend that initial communication checks are performed without TLS (using LADP protocol). Once correct operation has been confirmed, change to TLS (using LADPS protocol).

This is an illustrative example only. LDAP configurations vary considerably between organisations so the output for your environment may be quite different to that shown here. It is assumed that the person performing this configuration is well versed in LDAP and the way it is configured in your organization:

Procedure

  1. Examine the configuration of the LDAP server, using one of the following methods to ensure you can log into the LDAP server (preferably via the Protector proxy node to confirm the connection is working). Make a note of the Base DN and User/Group DNs listed in the output:

    1. Either connect to the LDAP server via a web based interface.

    2. Or connect via a command shell using the following Linux command. Consult the Linux man page for full syntax:

      ldapsearch 
      	-D "uid=admin,dc=mydomain,dc=com" 
      	-w pa55w0rd 
      	-H ldap://mydomain.com  
      	-b "dc=mydomain,dc=com" 	
      	-s sub "(objectClass=*)"
      Where the mydomain.com LDAP server's administrator UID is admin and the password is pa55w0rd.
    As an example, the output from ldapsearch should include the following configuration information. The highlighted parts will be required in the steps that follow:
    • The Base DN:
      # mydomain.com
      dn: dc=mydomain,dc=com
      objectClass: top
      objectClass: dcObject
      objectClass: organization
      o: mydomain.com
      dc: mydomain
    • The Administrator's DN (used as the Bind DN):
      # admin, mydomain.com
      dn: cn=admin,dc=mydomain,dc=com
      objectClass: simpleSecurityObject
      objectClass: organizationalRole
      cn: admin
      description: LDAP administrator
    • User DNs and UIDs:
      # Joe Bloggs, mydomain.com
      dn: cn=Joe Bloggs,dc=mydomain,dc=com
      givenName: Joe
      sn: Bloggs
      cn: Joe Bloggs
      uid: jbloggs
      uidNumber: 1000
      gidNumber: 500
      homeDirectory: /home/users/jbloggs
      loginShell: /bin/bash
      objectClass: inetOrgPerson
      objectClass: posixAccount
      objectClass: top
    • Group DNs and memberUids:
      # Managers, Groups, mydomain.com
      dn: cn=Managers,ou=Groups,dc=mydomain,dc=com
      gidNumber: 501
      objectClass: posixGroup
      objectClass: top
      cn: Managers
      memberUid: jbloggs
      memberUid: tsmith
      memberUid: mjones
      ...
  2. Configure the parameters in the Access Control Authentication Space Wizard as follows:

    NoteThe values entered are dependent on the particular LDAP configuration. Be sure to check the output generated by searchldap for your configuration to obtain the correct values.
    1. On the Configure authentication type page, select LDAP authentication, then enter the following parameters:

      • Proxy: Client5RHEL
      • Server URI: ldaps://mydomain.com
      • Server Port: If not using the default value, enter a port number.
      • Base DN: dc=mydomain,dc=com from the searchldap output:
        # mydomain.com
        ...
        dn: dc=mydomain,dc=com
        ...
      • Select Bind using specified account
      • Bind Account DN: cn=admin,dc=mydomain,dc=com from the searchldap output:
        # admin, mydomain.com
        ...
        dn: cn=admin,dc=mydomain,dc=com
        ...
      • Bind Account Password: pa55w0rd
    2. If using the LDAPS protocol, click TLS Configuration and configure the TLS Request Certificate Check method, TLS CA Certificate Directory and TLS CA Certificate File to use.

    3. Click Advanced Configuration and enter the following parameters based on the given searchldap output:

      • Person Filter: (objectClass=inetOrgPerson)
        # Joe Bloggs, mydomain.com
        ...
        objectClass: inetOrgPerson
        ...
      • Group Filter: (objectClass=posixGroup)
        # Managers, Groups, mydomain.com
        ...
        objectClass: posixGroup
        ...
      • Group Strategy: select Groups know users
        # Managers, Groups, mydomain.com
        ...
        memberUid: jbloggs
        memberUid: tsmith
        memberUid: mjones
        ...
      • Group Member Attribute: memberUid
        # Managers, Groups, mydomain.com
        ...
        memberUid: jbloggs
        ...
      • Group Member Type: select Member value contains a UID
        # Managers, Groups, mydomain.com
        ...
        memberUid: jbloggs
        ...
        # Joe Bloggs, mydomain.com
        ...
        uid: jbloggs
        ...
      • The following attribute values are evident from the output:
        • CN Attribute: cn
        • DN Attribute: dn
        • UID Attribute: uid
  3. Click Finish to close the wizard.

How to create an Access Control Profile Association

Before you begin

Refer to How to configure basic role based access control which describes how access control profile associations are used in configuring access control.

Ensure that the necessary Access Control Profiles and Authentication Spaces have been created (see How to create an access control profile and How to create an Authentication Space).

To create an access control profile association:

Procedure

  1. From the Access Control Dashboard click Manage ACP Associations to open the Access Control Profile Associations Inventory.

  2. Click the Create new item tile to open the Access Control Profile Association Wizard.

  3. Enter a Name and Description for the ACP Association.

  4. Select the type of association you require from the list on the left of the wizard:

    • User - associates the specified user with the selected ACPs.
    • Group - associates all users in the specified group with the selected ACPs.
    • Authentication Space - associates all users in the specified Authentication Space with the selected ACPs.
    The parameters appropriate to the ACP association type selected are displayed on the right of the wizard.
  5. Enter the parameters required for the selected ACP association type, then click Next.

  6. Select the ACPs to be included in the ACP association from the left-hand list by clicking on each ACP.

    Each ACP selected is added to the right-hand list. ACPs can be removed from the right-hand list by selecting them there.
  7. Click Finish to close the wizard and return to the inventory.

How to view the access control settings summary

Before you begin

Refer to How to configure basic role based access control.

Ensure that the necessary access control profile associations have been created (see How to create an Access Control Profile Association).

To view a summary of the current access control settings for each Protector user or group:

Procedure

  1. From the Access Control Dashboard click Manage ACP Associations to open the Access Control Profile Associations Inventory.

    You can also access the summary information from the Access Control Authentication Spaces Inventory, Access Control Profiles Inventory, Access Control Roles Inventory or Access Control Resource Groups Inventory.
  2. Open the drop down menu in the Navigation Breadcrumbs by clicking the GUID-5B249BF3-CA3C-471D-BB85-9CBFAAFC1A9D-low.png button and select Summary from the menu.

    The Access Control Summary is displayed.
  3. Click on the [>] to the left of the User or Group of interest to view its related ACPs, Role, Activity Groups,Activities, Resource Groups and Resources.

How to edit object permissions

Permissions control if an object (e.g. a data flow, schedule etc.) is visible to, or modifiable by specific users.

Note

For normal creation of objects (e.g. policies, dataflows, schedules and store templates), the creating user is given Read/Write access, allowing that user to see and change the object. Users having the RBAC Override Ownership Permissions privilege can also see and edit the object. Nobody else will be able to view the object unless granted access.

Normal users (i.e. those without the RBAC Override Ownership Permissions privilege) are prevented from removing all permissions, although they can still remove their own access rights. Only users with the RBAC Override Ownership Permissions privilege can remove all permissions.

To edit the permissions for an object:

Procedure

  1. Go to the Details or Inventory page of the object for which you want to edit the permissions.

  2. Click Edit Permissions in the top right of the page.

    The Access Control Permissions Inventory will be displayed, showing the users and groups that have read and write access to the object.
  3. You can then do one of the following:

    • Add a new user or group permission by clicking the Create New Item tile.
    • Edit an existing permission by clicking the user or group name on a tile.
    • Remove an existing permission by selecting a tile and clicking Remove.
    Editing does not allow the user or group name to be changed. To do this, remove the existing permission, then add a new one.When you edit or create a permission, the Access Control Permissions Wizard opens.
  4. For new permissions, Select the type of permission you require from the list on the left of the wizard:

    • User - to grant a single user permission
    • Group - to grant a group of users permission
    The parameters appropriate to the permission type selected are displayed on the right of the wizard.
  5. Check Write Access if you want the user or group to be able to modify the object. Read access is automatically granted to any user or group added to the permissions inventory for that object.

  6. Click Finish to close the wizard and return to the inventory.

 

  • Was this article helpful?