How to Use HubStor's Role Based Access Control (RBAC)
HubStor includes Role-Based Access Control (RBAC) for managing
authorization. After authenticating, all access, whether they be
administrators, privileged users, or end-users, must pass this
authorization layer before they are granted access in HubStor.
This article provides instructions on how to configure principals and
roles, and explains the different permissions that can be applied.
Step 1 -- Navigate to Users & Roles
Click the 'Administration' tab and then click 'Users & Roles'.
Step 2 -- Create and Configure Roles
Using roles is optional. If you prefer to administer permissions on a per user or per group basis, skip to Step 3.
To create roles, click the 'Roles' tab and then click the 'Add Role' button.
: You'll notice that there is a 'Default' role. For information on this, see WHAT IS THE DEFAULT ROLE USED FOR IN HUBSTOR?
Clicking 'Add Role' will display the 'Manage Role
' window. Enter a name and optionally provide a description.
Next, click the 'Members' tab to add users and/or
groups to the role. Click the blue checkbox beside the users / groups
you wish to add to the role. When finished, click 'Apply' to save the role.
NOTE: In the
'Members' tab, you can click the column headers to sort. You can also
search in the text box to quickly find the users / groups that you are
Step 3 -- (Optional) Configure Users / Groups Individually
Instead of, or in addition to, you can configure authorization from users / groups.
Click the 'Users/Groups
' tab. Here you'll see a
complete listing of all users and groups from your directory, in
addition to automatically populated external users (from any external
sharing) and shadow users. Use the column sorting feature, filtering, or
search to find the principal(s) you wish to edit, then click the edit
icon to configure their permissions and role membership(s).
Overview of Link-based Stubbing
HubStor's link-based stubbing method is intended for use with CIFS/NFS-based storage, such as NetApp or EMC Celerra. It can also work with Windows-based file shares. With HubStor's link-based stubbing, you can perform simple and effective ...
How to Install and Configure Link-based Stubbing
This article describes the steps necessary to configure link-based stubbing. Below are the high-level steps involved: Select a Windows Server to act as the Retrieval Server. This server can an existing Windows Server or a provisioned virtual ...
Definition of the Permissions in HubStor's Authorization / RBAC Model
Access All Items This permission permits a user to retrieve any folder/item in the entire HubStor tenant, even when an item has the 'Prevent Retrieval' tag behavior associated to it. It is the only permission that is not granted as part of the 'Full ...
What is the 'Default' Role Used for in HubStor?
In HubStor's Role-Based Access Control (RBAC) model there is always a 'Default' role that exists, to which all users are added. The default configuration for the Default role is access to the HubStor User Portal and the ability to perform retrieval, ...
Overview of the HubStor Connector Service (HCS)
The HCS is software that is deployed behind your firewall to provide policy-based archiving to your HubStor cloud tenant. The HCS runs on a Windows VM, uses a service account, and can be installed and configured in minutes. With the HCS installed, ...