System

System is a web interface section where general information and settings are stored and can be edited.

To view this section, click the gear icon in the header.

The System section is divided into tabs, each described below.

System Settings

This tab contains basic system settings of the DPX Master Server.

Master Server

This section stores the DPX Master Server’s hostname and IP address. These settings cannot be edited and are purely informational.

Enterprise Configuration

This section allows for basic Enterprise configuration. Click Edit to open the Edit Enterprise Configuration dialog.

Enterprise name

Change the name of your enterprise as displayed at the top of data trees.

The character limit is 1024; all characters are allowed, excluding " .

Enable reconstructive catalog

This option controls how DPX tracks files in the Catalog. If enabled, a Reconstructive Catalog entry is built. A reconstructive Catalog is necessary for a reconstructive restore. Reconstructive restore is only available for file backup and restore.

See also. For more information, see Reconstructive Catalog.

If you select Enabled, a check box labeled Reconstructive Restore appears in the Filter Displayed Jobs dialog in the desktop interface and the configure defaults dialog when defining a restore job This check box indicates that a reconstructive Catalog is desired. If you select Disabled, the check box does not appear.

When performing a Reconstructive Restore with mount points, DPX automatically uses Restore Data and Mount Point; Replace Existing Mount Point no matter what setting you choose in the Mount Point Handling restore destination option.

Enterprise Authentication

This section handles node authentication within the Enterprise. If Enterprise Authentication is enabled, an Enterprise authentication key is generated. You can change this setting by clicking the Edit button to launch the Edit Enterprise Authentication dialog window.

See also. For more information, see Enterprise Authentication.

License

This section displays information about the current DPX license. To specify a new license key or change the default license usage warning level, click the Edit button to launch the Edit License dialog window.

If your license is about to expire and you have obtained a new license key, type the new key into the License key entry field and click Save. If the key is valid, your license will be instantly updated.

SMTP Server Configuration

This section displays your SMTP server configuration. To change the configuration, click the Edit button to launch the Edit SMTP Server Configuration dialog window.

You can also configure the e-mail address that will appear as the sender of DPX notifications.

E-mail Notification Defaults

This section displays details concerning default e-mail notifications. To edit them, click the Edit button to launch the Edit E-mail Notification Defaults dialog window.

User Authentication

This section concerns user authentication modes and their respective options.

The default mode is Native. For LDAP authentication, select LDAP. When LDAP is selected, the LDAP Server Settings fields are displayed.

To edit the settings, click Edit to launch the Edit User Authentication dialog window.

Native

  • Password expiration period

    The number of days that a password can be used by an administrator before it expires. The value must be between 1 and 999. If the toggle is off, the password never expires. If your password has less than 8 days remaining before the maximum password age is reached, DPX alerts you to change the password. If you attempt to log in after the password expires, you will be granted one login and a “changing password” dialog box will appear. If this one last chance fails, you must contact the system administrator to change the password.

  • Allowed number of failed login attempts

    The number of consecutive failed login attempts before a user is prevented from entering DPX. The value must be between 1 and 999. If the toggle is off, the user has an infinite number of attempts. A locked-out account must be reset by the system administrator.

LDAP

Fields under LDAP Server Settings Options apply to Active Directory (AD). The following fields are displayed if you select the LDAP authentication mode.

  • Hostname

    Enter the IP address or resolvable logical node name of the LDAP server.

  • Port

    The default port is 389. You can enter a different port number.

    Switch on the Enable SSL connection toggle to enable Secure Socket Layer connection to the LDAP server. If you select SSL, the default port changes to 636. If you switch the toggle on, you may need to import a server certificate manually to the DPX Master Server. If the master server cannot find a recognizable server certificate, you will be notified when you click the Test button. To import server certificates, see Importing an LDAP Server Certificate to DPX the Master Server.

  • Bind DN

    Enter the Bind Distinguish Name. The Bind DN specifies the name used for authentication of the connection to the LDAP server. Note that simple bind is used; SASL and anonymous bind are not supported.

    Specify a fully distinguished name in LDAP form. By default in AD, user accounts and groups are in the Users folder under your domain, which is specified in LDAP form as cn=Users,dc=<Your Domain>. If your domain is company.com and users are stored in the default Users folder, an acceptable Bind DN would be cn=Administrator,cn=Users,dc=company,dc=com.

    You can specify Bind DN in user Principal Name format, <username>@<domain, for example, [email protected].

  • Password

    Enter a password. The supported password length is 1–20 Unicode characters.

  • Base DN

    Enter the Base Distinguish Name. The Base DN specifies where users and groups are loaded. By default in Active Directory, user accounts and groups are in the Users folder under your domain, which is specified in LDAP form as cn=Users,dc=<Your Domain>. If your domain is company.com and users are stored in the default Users folder, your base DN would be cn=Users,dc=company,dc=com.

    DPX uses Base DN for user provisioning when you add an administrator.

    See also. Adding an Administrator in the Desktop Interface section.

  • Username Attribute [LDAP mode]

    Select a username attribute from the pull-down list. This selection affects how usernames are imported to the Enterprise. The username attribute is used for user provisioning when you add an administrator. The following table lists the available username attributes and defines each attribute:

    Username Attribute
    Definition

    sAMAccountName

    The logon name for earlier versions of Windows.

    uid

    user id

    cn

    common name

    mail

    an email address

    DPX uses Username Attribute for provisioning when you add an administrator.

    See also. Adding an Administrator in the Desktop Interface.

  • Test button When you have completed the fields in the LDAP Server Settings section, click the Test button. DPX will attempt to connect to the Advanced Directory Server using the information you have specified in the LDAP Server Settings. A message indicates the result of the test. If you switch on the Enable SSL connection toggle, you may need to import a server certificate manually to the DPX Master Server. If the master server cannot find a recognizable server certificate, you will be notified when you click the Test button. To import server certificates, see Importing an LDAP Server Certificate to DPX the Master Server.

Credentials Store

This tab contains credentials used by DPX Master Server for authentication. DPX may use them for automated validation, e.g. when running jobs.

To add credentials to the store:

  1. Click Add credentials to launch the Add Credentials dialog window.

  2. Specify the name for your new credentials entry. The name must be unique within the Credentials Store.

  3. Provide the credentials, i.e. the username and password you want to store.

  1. Click Save. Your new credentials are now added to the Credentials Store.

Keyrings

Keyrings are groupings of DPX keys. These keys are used to derive actual encryption keys for data-encrypted jobs. For more information, see Configuring Keyrings.

This section lists all keyrings created by the DPX administrator.

Adding a Keyring

  1. Click the Add button in the upper right corner. The Keyring creation dialog will open.

  1. Specify the name for the new keyring. Most characters are allowed, excluding " ; ? * and whitespaces. The maximum length is 48 characters.

  2. Click Add. The new keyring is now created.

Editing a Keyring

Editing a keyring essentially involves adding a new key or deleting an existing one.

To edit a keyring, hover over the record with the keyring name and click the Edit button on the left.

To delete a key within a keyring, hover over the record of the key and click the Trash icon on the left. You will be prompted to confirm your decision.

Note. To delete a keyring, first remove all keys it contains.

Recovery Points

A recovery point is a specific point in time to which data can be restored or recovered. It allows for restoring data to a previous state or version, typically after a data loss or system failure.

You can control the recovery points view by ordering items by Job ID, Job Name, Expiration Date, Days Retained and Run Date, ascending or descending. Note also the Items per page value which can be useful when managing the display.

You can search Recovery Points by Job ID or Job Name. Select the Search radio button and type the string you want to use for filtering the fields.

If you hover over a job record, two icons will be shown on the right, allowing to change the retention period or expire the job immediately.

Note. Expiring a job will result in removing it from the view.

You can select multiple records (or select the uppermost checkbox to select all records) and perform the same action (change retention period or expire) for all selected jobs.

File Exclusion Rules

This section stores file exclusion rules for file backup.

You can control the view by ordering items by Rule Name or Pattern, ascending or descending. Note also the Items per page value which can be useful when managing the display.

Hover over a rule record to show three icons allowing you to copy, edit or delete the rule.

See also. Read more on the usage of exclusion rules in File Exclusion Rules.

Last updated