Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell NetWorker 19.9 Administration Guide

Setting up an RDZ resource

The following procedure shows RDZ resource setup for a client, but you can use this procedure when setting up any type of RDZ resource.

Before you create an RDZ, you must first review the NMC User Groups.

  • In the NMC Administration window, under Server, select User Groups.
  • Review the properties of each existing User Group to check which External Roles and Users are specified, along with the respective privileges.
  • By default, the Users user group contains all users ("*@*"), and if left unmodified, any RDZ user that you create inherits those privileges for all shared resources.
  • To prevent RDZ users from gaining unwanted access to shared resources, you must either restrict the External Roles or Users for the Users Group (or any others), or alternatively, uncheck some privileges.
  1. In the Server window, right-click Restricted Data Zones and select New .
    The Create Restricted Data Zone window appears.
    Figure 1. Create Restricted Data Zone in the NetWorker Administration Server window
    Create Restricted Data Zone
  2. Create the RDZ (for example, RDZ1) by naming the RDZ and specifying any restrictions.
    Use the Restrictions subsection to set limits on the clients, devices, storage nodes, and jukeboxes that can be owned by the restricted datazone to prevent resource abuse and limit what the tenant administrator can create. Setting restrictions can provide more control for major events that may impact the server, licensing limitations, and so on. These restrictions are in place even if using the RDZ as a global administrator.
    NOTE:Setting a resource restriction to a value of 0 indicates that the user cannot create this resource.

    If you plan to have a tenant administrator or tenant user, do the following:

    1. Specify the user using the External Roles or Users parameters.
    2. Under Privileges, select the privileges that the user will have in the RDZ.

      Typically, an RDZ tenant administrator will have all privileges, while a tenant user will have limited privileges.

    You can specify multiple users. However, they will each have the same privileges. To set up separate users with different privileges within the same RDZ, create a separate instance of the RDZ by repeating the above steps using the same RDZ name and restrictions, but with different External Roles, Users, and Privileges.

    If the global administrator is going to administer the RDZ and if there are no RDZ users, then the User Configuration section of the Create Restricted Data Zone window can be ignored.

  3. In the left navigation pane of the Protection window, right-click the desired resource (for example, Client) and select Properties to configure the resource with the RDZ. Note that in addition to using an existing resource, you can also create the resource for the RDZ.
    Resources that you can associate to an RDZ displays a Restricted Datazone tab in NMC (or the Restricted Datazone attribute in nsradmin).
  4. Select the Restricted Datazone tab. Resources automatically get associated to the Restricted Datazone a user belongs to when they create a resource.
    Figure 2. Restricted Data Zone Client Properties
    Restricted Data Zone Client Properties
  5. (Optional) In the left navigation pane of the Devices window, select a device if you want to give this RDZ client access to a specific device by right-clicking the device and selecting Properties. Give the RDZ client access to this device.
    Figure 3. Restricted Data Zones in Device Properties window
    Restricted Data Zones in Device Properties window
    NOTE:The RDZ can access the shared devices without any further device setup requirements for the shared resource if these devices are configured. Note, however, that multiple RDZs cannot simultaneously access the same device.
  6. Create a policy. In the Protection window, right-click Policy in the left navigation pane and select Create Policy.
  7. In the General tab, specify a name for the policy (in this example, RDZ1). In the Restricted Data Zone tab, select the RDZ from the drop-down, then click OK.
    Figure 4. Restricted Data Zones in Create Policy window
    Restricted Data Zones in Create Policy window
  8. Create a group. In the Protection window, right-click Group, and select New.
  9. Name the group and select the desired client(s). In the Restricted Datazone tab, select the RDZ from the drop-down, then click OK.
  10. In the Protection window, highlight the new policy and create a workflow. Associate this workflow with the new group.
    Figure 5. New workflow associated with RDZ group
    New workflow associated with RDZ group
    NOTE: You only must configure the policy and group resources for RDZ when using policies. The workflows and actions that are created as a result of it are kept within the policy feature and do not need any further RDZ configuration.
  11. Return to the Server window and highlight Restricted Datazones. Right-click and select Properties.
  12. Browse to the Clients tab. This tab now shows the clients that are associated with this RDZ. When a user belongs to an RDZ and creates a resource, this resource is automatically set to being owned by that RDZ.

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\