Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell PowerProtect Cyber Recovery 19.14 Security Configuration Guide

PDF

Security components

The Cyber Recovery software includes the following security components.

Users

User accounts refer to Cyber Recovery users in the Cyber Recovery vault. A username, password, role, first name, last name, email address, and telephone number define each user.

Create user accounts by using the Cyber Recovery UI, CLI, or REST API. Then, define user information and roles.

Privileges

Privileges define the tasks that users can perform in the Cyber Recovery environment. Privileges are assigned to roles and are granted to users depending on their role assignment.

Privileges are assigned to user roles. They cannot be assigned directly to a user.

Roles

Roles are containers of access privileges that you assign to users. In being assigned a role, the users receive the privileges that are assigned to that role. RBAC privileges describes the roles that are available.

Authentication

The Cyber Recovery REST API is used to provide authentication and authorization services in the Cyber Recovery vault. The Cyber Recovery software uses HTTPS to secure communications between the Cyber Recovery REST API and end-user components or client applications.

Token-based authentication

Authentication in the Cyber Recovery vault is performed by using tokens. This approach ensures that users can connect securely to the Cyber Recovery vault and perform authorized and secure operations.

Key-based authentication

SSH enables communication with Cyber Recovery assets. When you add an asset to your Cyber Recovery environment, provide a password to establish the initial SSH connection to add the Cyber Recovery software's public key to the asset. All subsequent SSH connections use the private and public keys for authentication with the password as a backup.


Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\