The
Cyber Recovery software includes the following security components.
Users
User accounts refer to
Cyber Recovery users in the
Cyber Recovery vault. A username, password, role, first name, last name, email address, and telephone number define each user.
Create user accounts by using the
Cyber Recovery UI, CLI, or REST API. Then, define user information and roles.
Privileges
Privileges define the tasks that users can perform in the
Cyber Recovery environment. Privileges are assigned to roles and are granted to users depending on their role assignment.
Privileges are assigned to user roles. They cannot be assigned directly to a user.
Roles
Roles are containers of access privileges that you assign to users. In being assigned a role, the users receive the privileges that are assigned to that role.
RBAC privileges describes the roles that are available.
Authentication
The
Cyber Recovery REST API is used to provide authentication and authorization services in the
Cyber Recovery vault. The
Cyber Recovery software uses HTTPS to secure communications between the
Cyber Recovery REST API and end-user components or client applications.
Token-based authentication
Authentication in the
Cyber Recovery vault is performed by using tokens. This approach ensures that users can connect securely to the
Cyber Recovery vault and perform authorized and secure operations.
Key-based authentication
SSH enables communication with
Cyber Recovery assets. When you add an asset to your
Cyber Recovery environment, provide a password to establish the initial SSH connection to add the
Cyber Recovery software's public key to the asset. All subsequent SSH connections use the private and public keys for authentication with the password as a backup.
Data is not available for the Topic
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please select whether the article was helpful or not.
Comments cannot contain these special characters: <>()\