Backup and Recovery
Backup and Recovery 7.1
Backup and Recovery 7.1
  • Storware Backup & Recovery documentation
    • Table of Contents
  • Changelog
  • Overview
    • Main Features
    • Storware Backup and Recovery concepts
      • Support Matrix
      • Architecture
      • Components
      • Backup types
      • Typical Scenarios
    • Licensing
    • Product Life Cycle
  • Deployment
    • Component requirements
    • Supported platforms requirements
    • Sizing Guide
      • Small
      • Medium
      • Large
    • Installation
      • ISO-based installation
      • Quick Installation using all-in-one script
      • Installation using Ansible playbook
      • Installation with RPMs
      • Deployment in Microsoft Azure
      • Virtual Appliance
        • RHV/oVirt/OLVM Virtual Appliance
        • Citrix Hypervisor | XCP-ng Virtual Appliance
        • VMware Virtual Appliance
        • Nutanix Acropolis Hypervisor (AHV)
    • Initial Configuration
    • Backup Destinations
      • File System
        • Synthetic File System
          • XFS
          • DD Boost
        • isoLayer (Synthetic)
        • File system
          • Virtual Data Optimizer (VDO)
        • Catalogic Software vStor
      • Deduplication Appliances
        • Dell EMC Data Domain
        • Huawei OceanProtect
        • HPE StoreOnce
        • Exagrid
        • Neverfail HybriStor
      • Object Storage
        • Alibaba Cloud OSS
        • AWS S3 or S3-compatible
        • Ceph Rados Gateway
        • Cloudian S3
        • Wasabi
        • Google Cloud Storage
        • IBM Cloud Object Storage
        • Microsoft Azure Blob Storage
        • Nutanix Objects
        • OpenStack SWIFT
        • Oracle Cloud Infrastructure Object Storage
        • Scality RING
      • Enterprise Backup Providers
        • Dell EMC Avamar
        • Dell EMC Networker
        • IBM Spectrum Protect
        • Micro Focus Data Protector
        • Veritas NetBackup
        • Rubrik Managed Volumes
      • Tape Pools
    • High Availability
      • 2 Node Cluster
      • 3 Node Cluster
    • Common tasks
      • Staging space configuration
      • Enabling HTTPS connectivity for nodes
      • LVM setup on Storware Backup & Recovery Node for disk attachment backup mode
      • Full versions of libvirt/qemu packages installation
      • SSH public key authentication
      • Enabling HTTP(S) Proxy for Storware Backup & Recovery
  • Protecting Virtual Environments
    • Virtual Machines
      • VMware vSphere/ESXi
      • Microsoft Hyper-V
      • Azure Stack HCI
      • Nutanix Acropolis Hypervisor (AHV)
      • Red Hat Openshift Virtualization
      • Red Hat Virtualization
      • oVirt
      • Oracle Linux Virtualization Manager
      • Oracle VM
      • Proxmox VE
      • KVM/Xen
      • OpenStack
      • OpenNebula
      • Virtuozzo
      • Verge
      • Citrix Hypervisor (XenServer)
      • XCP-ng
      • Huawei FusionCompute
      • HPE SimpliVity
      • SC//Platform
    • Cloud
      • Amazon EC2
      • GCP GCE
      • Azure Cloud
    • Containers
      • Kubernetes
      • Red Hat OpenShift
      • Proxmox VE
    • Backup & Restore
    • v2v migration
  • Protecting Microsoft 365
    • Microsoft 365 organization management
      • Configure Microsoft 365 access
      • Add Microsoft 365 organization manually
      • Add Microsoft 365 organization using the Setup Assistant
      • Account auto-synchronization
    • Backup & Restore
    • Suppoted Sharepoint templates, and limitations
  • File Level Backup and Restore - OS Agent
  • Protecting Applications
    • Applications
      • MSSQL
      • MySQL/MariaDB
      • PostgreSQL
      • DB2
      • Oracle
      • Relax and Recover - ReaR
      • Git
      • oVirt/RHV/OLVM
      • Kubernetes/OpenShift etcd
    • Backup & Restore
  • Protecting Storage Providers
    • Storage Providers
      • Ceph RBD
      • Nutanix Files
      • Nutanix Volume Groups
    • Backup & Restore
  • Administration
    • Dashboard
    • Virtual Environments
      • Instances
        • Backup on-demand
        • Restore on-demand
        • Snapshot Management
      • Virtualization Providers
      • Backup SLAs
        • Policies
        • Schedules
      • Snapshot SLAs
        • Policies
        • Schedules
      • Recovery Plans
        • Policies
        • Schedules
      • Mounted Backups (File-level Restore)
    • Storage
      • Instances
        • Backup on-demand
        • Restore on-demand
      • Infrastructure
      • Backup SLAs
        • Policies
        • Schedules
      • Snapshot SLAs
        • Policies
        • Schedules
      • Mounted Backups (File-level Restore)
    • Cloud
      • Instances
      • Service Providers
      • Backup SLAs
        • Policies
        • Schedules
      • Download
    • Applications
      • Instances
      • Execution Configurations
      • Backup SLAs
    • Endpoints
      • Environment
      • Administrators
      • Endpoints Server Management
        • Dashboard
        • Packages
        • Organizations
      • Endpoints Administrator
        • Dashboard
        • Users
          • Local users
          • LDAP users
        • Devices
          • Devices list view
          • Device status
        • Backup SLA
          • Create a Backup SLA
            • GENERAL
            • WINDOWS
            • MAC OS (technical preview)
            • EMAIL CLIENTS
          • Backup SLA management
          • Backup SLA removal
        • Restore Jobs
        • Client Deployments
    • Reporting
      • Virtual Environments
      • Storage
      • Microsoft 365
      • Applications
      • Notifications
      • Audit Log
    • Nodes
      • Instances
      • Node Configurations
    • Access Management
      • Users
      • Groups
      • Roles
      • OS Credentials
    • Settings
      • Global Settings
      • Internal DB Backup
      • Notification Rules
      • Mailing Lists
      • Endpoints Global Settings
    • Upgrade
    • CLI Reference
    • CLI v2 Reference
  • Integration
  • Integration Plugins
    • Red Hat Virtualization UI Plugin
    • oVirt UI Plugin
    • Oracle Linux Virtualization Manager UI Plugin
    • OpenStack UI Plugin
  • Troubleshooting
    • Enable DEBUG mode in Storware Backup and Recovery
    • Collecting logs
    • External log targets
    • Disaster Recovery
  • Known software issues and limitations
  • Glossary
Powered by GitBook
On this page
  • Permissions
  • Security contexts
  1. Administration
  2. Access Management

Roles

The Role is a set of permissions to the different sections and actions in Storware Backup & Recovery. When multiple roles are assigned to the Group, the resulting permissions will be the sum of all permissions from all assigned roles.

Note:

  • It is mandatory to have always at least one account with permission to manage Users

  • in other words: at least one account must be assigned to the group, which has a role with this permission.

Permissions

Section (Name)
Permission
Allows

Nodes

Instances

Read - allows you to view the list of instances and basic information Register - allows you to register new nodes in the environment

Write - allows you to change selected node config

Delete - allows you to remove a node from the environment

Nodes

Node Configurations

Read - allows you to browse the list of configs and open them

Write - allows you to modify existing configs and create new ones

Virtual Environments

Instances

Read - allows you to browse the list of instances and open them

Write - allows you to modify virtual machine settings

Backup - allows you to perform a manual backup

Restore - allows you to perform a manual restore

Snapshot - allows you to perform a manual snapshot

Mount - allows you to mount a backup for file-level restore

Clean old Snapshot - allows you to perform the "Clean old snapshot" task

Virtual Environments

Infrastructure

Read - allows you to browse the list of infrastructure objects for all tabs

Write - allows you to modify settings for existing objects and to add new ones

Test Connectivity - This permission allows you to enable or disable access to the connectivity test

Virtual Environments

Backup SLAs

Read - allows you to browse the list of policies and schedules

Write - allows you to modify the existing and add new ones

Virtual Environments

Snapshot SLAs

Read - allows you to browse the list of policies and schedules

Write - allows you to modify the existing and add new ones

Virtual Environments

Recovery Plans

Read - allows you to browse the list of policies and schedules

Write - allows you to modify the existing and add new ones

Virtual Environments

Mounted Backups

Read - allows you to browse the list of mounted backups and also to download files

Unmount - allows you to unmount a backup

Applications

Instances

Read - allows you to browse the list of instances and open them

Write - allows you to modify virtual machine settings

Backup - allows you to perform a manual backup

Restore - allows you to perform a manual restore

Applications

Execution Configurations

Read - allows you to browse the list of execution configs

Write - allows you to modify the existing and add new ones

Applications

Backup SLAs

Read - allows you to browse the list of policies and schedules

Write - allows you to modify the existing and add new ones

Storage

Instances

Read - allows you to browse the list of instances and open them

Write - allows you to modify storage instance settings

Backup - allows you to perform a manual backup

Restore - allows you to perform a manual restore

Snapshot - allows you to perform a manual snapshot

Mount - allows you to mount a backup for file-level restore

Clean old Snapshot - allows you to perform the "Clean old snapshot" task

Storage

Infrastructure

Read - allows you to browse the list of infrastructure objects for all tabs

Write - allows you to modify settings for existing objects and to add new ones

Test Connectivity - This permission allows you to enable or disable access to the connectivity test

Storage

Backup SLAs

Read - allows you to browse the list of policies and schedules

Write - allows you to modify the existing and add new ones

Storage

Snapshot SLAs

Read - allows you to browse the list of policies and schedules

Write - allows you to modify the existing and add new ones

Storage

Mounted Backups

Read - allows you to browse the list of mounted backups and also to download files

Unmount - allows you to unmount a backup

Reporting

Reporting

Read - allows you to view report data for virtual machines and storage providers Send report - This permission allows you to enable or disable the ability to send the report by mail

Reporting

Audit Log

Read - This permission allows you to enable or disable access to the audit log report

Backup Destinations

Backup Destination

Read - allows you to browse the list of backup destinations

Write - allows you to modify settings for existing objects and to add new ones

Test Connectivity - This permission allows you to enable or disable access to the connectivity test

Clean old backups - This permission allows you to enable or disable the ability to perform this task

Access Management

Access Management

Read - allows you to browse the list of objects for all access management tabs

Write - allows you to modify existing objects and to add new ones

Change passwords - allows you to change user passwords

Settings

Settings

Read - allows you to view selected settings for all tabs in the "settings" section

Write - allows you to modify settings for all tabs in the "settings" section

Tasks Console

Tasks Console

Read - this permission allows you to hide or show the "Task Console" floating panel

Write - allows you to remove/cancel tasks from the list

Restore Job

Restore Job

Read - This permission allows you to enable or disable access to the information about restore tasks - under tasks console, details of virtual machine or storage instance and from recovery plans

Security contexts

The security context defines the set of system objects that can be accessed with defined permissions.

The object hierarchy is constructed in a way that any defined privileges will apply to the specified object and to all the downstream objects, therefore the System Level security context defines the access to all objects across the platform and disables the choice of lower-level objects.

Security contexts have been aggregated into the specified hierarchy. Different system object types can have different parental objects (or none) and so will appear in the different sections of the tree.

Selected objects will be visible in the table on the right-hand side.

The full hierarchy:

  • Hypervisor Managers

    • Projects

      • Virtual Environments

    • Data Centers

      • Hypervisors

        • Virtual Environments

      • Clusters

        • Hypervisors

        • Virtual Environments

      • Virtual Environments

    • Clusters

      • Hypervisors

      • Virtual Environments

    • Hypervisors

      • Virtual Environments

    • Virtual Environments

  • Hypervisors

    • Virtual Environments

  • Application Configurations

    • Applications

  • Storage Providers

    • Storages

PreviousGroupsNextOS Credentials