-
kbr
- Service Provider
- Posts: 37
- Liked: 23 times
- Joined: Oct 09, 2020 7:36 am
- Full Name: Karl
- Contact:
Feature Request V13: LDAPS for AD integration from within V13 GUI
Currently only user that have been locally created on the V13 appliance and then added once again to the GUI can be given access. Why not build in an option to the GUI to add LDAPS connectivity to for instance windows AD. Currently this is a manual CLI proces which gives lot of questions about how supportability etc.
-
Mildur
- Product Manager
- Posts: 11547
- Liked: 3239 times
- Joined: May 13, 2017 4:51 pm
- Full Name: Fabian K.
- Location: Switzerland
- Contact:
Re: Feature Request V13: LDAPS for AD integration from within V13 GUI
Hi Karl,
Our appliances can be joined to a Active Directory domain (Help Center). If you join the appliance to your Active Directory domain, you can assign domain users or groups permissions on the backup server.
Additionally, Veeam Backup & Replication v13 has now SAML support.
Best,
Fabian
Our appliances can be joined to a Active Directory domain (Help Center). If you join the appliance to your Active Directory domain, you can assign domain users or groups permissions on the backup server.
Additionally, Veeam Backup & Replication v13 has now SAML support.
Best,
Fabian
Product Management Analyst @ Veeam Software
-
kbr
- Service Provider
- Posts: 37
- Liked: 23 times
- Joined: Oct 09, 2020 7:36 am
- Full Name: Karl
- Contact:
Re: Feature Request V13: LDAPS for AD integration from within V13 GUI
Hi Fabian, i have a SR running for this for quite a while now, no clue why they did not come back with this AD join functionality. Question is, what is the impact of joining the appliance to AD? With all versions before 13 we were instructed to keep away from joining an AD because of the security implications. Is it now OK and fine to join an AD??
-
Mildur
- Product Manager
- Posts: 11547
- Liked: 3239 times
- Joined: May 13, 2017 4:51 pm
- Full Name: Fabian K.
- Location: Switzerland
- Contact:
Re: Feature Request V13: LDAPS for AD integration from within V13 GUI
With Windows-based backup servers (v13 and earlier), a hijacked domain administrator account could potentially log on via RDP or the command line and manipulate the system.
That is not possible on the appliance: SSH can be disabled, root access is disabled by default and must be explicitly approved by a local Security Officer account (if enabled during deployment). With an immutable backup storage on a dedicated repository, the backups are protected as well.
And considering that you can enable MFA for every user connecting to the backup server on the appliance, joining a Linux based backup server to Active Directory does not feel unsafe to me. Even if an attacker compromises your Active Directory, he can't do any damage on the appliance backup server if he doesn't have the MFA token.
Some scenarios, such as Hyper-V clusters, also require a domain-joined backup server appliance.
Best,
Fabian
That is not possible on the appliance: SSH can be disabled, root access is disabled by default and must be explicitly approved by a local Security Officer account (if enabled during deployment). With an immutable backup storage on a dedicated repository, the backups are protected as well.
And considering that you can enable MFA for every user connecting to the backup server on the appliance, joining a Linux based backup server to Active Directory does not feel unsafe to me. Even if an attacker compromises your Active Directory, he can't do any damage on the appliance backup server if he doesn't have the MFA token.
Some scenarios, such as Hyper-V clusters, also require a domain-joined backup server appliance.
Best,
Fabian
Product Management Analyst @ Veeam Software
Who is online
Users browsing this forum: No registered users and 110 guests