NetWorker Authc and Active Directory(AD) integration

preview_player
Показать описание
NetWorker Commands App:

My Lab Set up:

Contact Information:

Integrating NetWorker Authc with AD/LDAP

Hello Viewers, welcome back. In today’s video we will look at how to integrate NetWorker Authc service with your Active Directory.

Integrating your authc with AD gives you the flexibility of using the same authentication authority which means no more maintaining a password repository or a worksheet with all the passwords needed to support your infrastructure. For those who don't know much about Authc, Authc is short for NetWorker Authentication service which is a web-based application that runs within an Apache Tomcat instance on the backup server. The Authc provides a NetWorker environment with token-based authentication and Single Sign on support. This enables users to securely connect to the NMC server, NetWorker server to perform various operations. The NMC and NetWorker servers do not authenticate the user against the LDAP authority. The NMC server requests user validation from the NetWorker Authentication Service. The NetWorker Authentication Service performs a look-up to determine the LDAP or AD group that the authenticated user belongs to in the external authority. When authentication succeeds, the NetWorker Authentication Service issues a token to the NMC server. Activities that you perform in the Console window and the NetWorker Administration window uses the token information to ensure that the user can perform only the activities that the user has the appropriate privileges to perform. This as said before makes it easier and much cleaner to perform user management on NetWorker.

Example command with data:
authc_config -u administrator -e add-config
-D "config-tenant-id=33"
-D "config-name=crazyrov-integration"
-D "config-domain=crazyrov"
-D "config-user-dn=cn=administrator,cn=users,dc=iddlab,dc=local"
-D "config-user-dn-password=1.Password"
-D "config-user-group-attr=memberof"
-D "config-user-id-attr=sAMAccountName"
-D "config-user-object-class=person"
-D "config-user-search-path=cn=users"
-D "config-group-member-attr=member"
-D "config-group-name-attr=cn"
-D "config-group-object-class=group"
-D "config-group-search-path="
-D "config-object-class=objectclass"
-D "config-active-directory=y"
-D "config-search-subtree=y"
Рекомендации по теме
Комментарии
Автор

Thank you very much for all your videos.

azsamih
Автор

Very nice video and thank you for putting these videos out.. As someone who's worked with NetWorker, Avamar, and newer gen devices (Cohesity and Rubrik), NetWorker is so dated. You shouldn't need a 30min video to LDAP something.

ishmealmiller
Автор

Would you happen to have a video on backing up a cifs share through a host? I have looked at the manual and followed all the steps and the work flow and policy still fails

wcjones
Автор

Please do the video on technical differneces between 8 and 9 and the next version

nivedithajakkula
Автор

When I try the steps to add External Authentication Authority I get the following "176230:Unable to add external authentication provider to authentication service [errorMsg: Post failed with HTTP-Error:400 Server message :could not parse server-response from json string HTTPErrorCode:400. Any ideas on how to fix this?

wcjones
Автор

Is it possible to configure LDAP without NMC, My organization is trying to eliminate usage of NMC/Java based management. So we are thinking to Switch HTML based NWUI. Do you have procedure to configure LDAP on networker server directly to access NWUI using Domain users

singaporeshaik