Zoltan, 

As much as I hate Powershell it does have its uses

One thing it can do is create an encrypted authorization token that can be used 
to authenticate.  That token can be applied when you run a command, so it 
allows the use of the restricted id without providing the password in clear.

Invoking dsmadmc from powershell is a whole other world of pain, but just 
starting dsm for your user may not be so difficult.

Note I have looked into this several times, but never actually implemented it. 
My use-case was to save my password for a dsmadmc invocation.  
https://blog.kloud.com.au/2016/04/21/using-saved-credentials-securely-in-powershell-scripts/
 may be a good place to start.

Regards

Steve

-----Original Message-----
From: ADSM: Dist Stor Manager [mailto:ADSM-L@VM.MARIST.EDU] On Behalf Of Zoltan 
Forray
Sent: Saturday, 11 August 2018 3:44 AM
To: ADSM-L@VM.MARIST.EDU
Subject: Re: [ADSM-L] Proxy/asnodename restore and strange Registry entries?

Thanks for the suggestion Steven.

After much machinations and struggling against the admin lockdowns, we were 
able to get it to work, but in a totally illegal way.

1.  We had to access the AD account/password that is used for backing up
*ALL* of the CIFS/DFS nodes.  We certainly can not give this information out 
and audit/ISO certainly would not allow it.
2.  We had to add the account (#1) to the Backup Operators group on the desktop 
used for the ISP client restore process (very few people are allowed to do this 
and nobody has access to desktop/local administrator
accounts)

As I mentioned, the backups we need to access via proxy are run via a special 
AD account (identified in the scheduler service). So looking for suggestions on 
how to do this a different way, if possible.

I do have a question about the proxy process.  To test this, I created a dummy 
ISP node so the desktop client can sign-in to it to be able to use "Access 
another node".  My question is, since I setup the proxy target (node that has 
the data/backups) and proxy agent (dummy node), on the ISP server, do I still 
need to go to the target node and give the agent access?

On Mon, Aug 6, 2018 at 7:27 PM Harris, Steven < 
steven.har...@btfinancialgroup.com> wrote:

> Runas?
>
> -----Original Message-----
> From: ADSM: Dist Stor Manager [mailto:ADSM-L@VM.MARIST.EDU] On Behalf 
> Of Zoltan Forray
> Sent: Tuesday, 7 August 2018 5:57 AM
> To: ADSM-L@VM.MARIST.EDU
> Subject: Re: [ADSM-L] Proxy/asnodename restore and strange Registry 
> entries?
>
> I have another issue with the Proxy/asnodename process I hope someone 
> can direct me to the answer since I am still kinda lost in this Proxy process.
>
> To use the Proxy process, we had to install the standard Windows 
> GUI/client
> (8.1.0.2) on a desktop. I created a new node and use the proxy grant 
> process to give it agent authority over the other nodes we want to 
> restore from/for.  Also made the proxy authority the other way - just in case.
>
> Now, every time we try to restore a file, we get a "Permissions Denied"
> authority issue.  We think we know why due don't know how to get 
> around it.  In the current setup, the Windows services that perform 
> the backups and restores (via WebClient) use a specific AD account 
> that has the right authority.
>
> So how do you associate a specific AD account with a GUI 
> session/client so it has the proper rights to do restores?
>
> On Sat, Aug 4, 2018 at 7:50 AM Zoltan Forray <zfor...@vcu.edu> wrote:
>
> > I guess I should have mentioned that. Windows 10 Enterprise desktop 
> > is what I am using to access the proxy node of a Windows 2016 Server backup.
> >
> > Zoltan Forray
> > IBM Spectrum Protect (p.k.a. TSM) Software & Hardware Administrator 
> > VMware Administrator Xymon Administrator VCU Computer Center 
> > zfor...@vcu.edu - 804-828-4807 Don't be a phishing victim - VCU and 
> > other reputable organizations will never use email to request that 
> > you reply with your password, social security number or confidential 
> > personal information. For more details visit 
> > https://phishing.vcu.edu
> >
> > On Fri, Aug 3, 2018, 9:36 AM Robert Talda <r...@cornell.edu> wrote:
> >
> >> Zoltan:
> >>  Willing to test here - which platform (Windows, Linux x86, etc) 
> >> are you running the client on?
> >>
> >> Robert Talda
> >> EZ-Backup Systems Engineer
> >> Cornell University
> >> +1 607-255-8280
> >> r...@cornell.edu
> >>
> >>
> >> > On Aug 2, 2018, at 10:35 AM, Zoltan Forray <zfor...@vcu.edu> wrote:
> >> >
> >> > We are working through trying to move to using Proxy/asnodename
> >> processes
> >> > to replace the html interface for our ISILON backups and are 
> >> > seeing some strangeness in the 8.1.0.2 GUI
> >> >
> >> > When I bring up the GUI and the process to access another node, 
> >> > when I expand the "File Level" section, 6 "Registry" appear?
> >> > Besides there
> >> being
> >> > 6-of them, this makes no sense since the backups are ISILON file 
> >> > level - not OS level.  There aren't any systemstate/registry level.
> >> >
> >> > What gives?
> >> >
> >>
> >
>
> --
> *Zoltan Forray*
> Spectrum Protect (p.k.a. TSM) Software & Hardware Administrator Xymon 
> Monitor Administrator VMware Administrator Virginia Commonwealth 
> University UCC/Office of Technology Services www.ucc.vcu.edu 
> zfor...@vcu.edu -
> 804-828-4807 Don't be a phishing victim - VCU and other reputable 
> organizations will never use email to request that you reply with your 
> password, social security number or confidential personal information. 
> For more details visit http://phishing.vcu.edu/
>
> This message and any attachment is confidential and may be privileged 
> or otherwise protected from disclosure. You should immediately delete 
> the message if you are not the intended recipient. If you have 
> received this email by mistake please delete it from your system; you 
> should not copy the message or disclose its content to anyone.
>
> This electronic communication may contain general financial product 
> advice but should not be relied upon or construed as a recommendation 
> of any financial product. The information has been prepared without 
> taking into account your objectives, financial situation or needs. You 
> should consider the Product Disclosure Statement relating to the 
> financial product and consult your financial adviser before making a 
> decision about whether to acquire, hold or dispose of a financial product.
>
> For further details on the financial product please go to 
> http://www.bt.com.au
>
> Past performance is not a reliable indicator of future performance.
>


--
*Zoltan Forray*
Spectrum Protect (p.k.a. TSM) Software & Hardware Administrator Xymon Monitor 
Administrator VMware Administrator Virginia Commonwealth University UCC/Office 
of Technology Services www.ucc.vcu.edu zfor...@vcu.edu - 804-828-4807 Don't be 
a phishing victim - VCU and other reputable organizations will never use email 
to request that you reply with your password, social security number or 
confidential personal information. For more details visit 
http://phishing.vcu.edu/

This message and any attachment is confidential and may be privileged or 
otherwise protected from disclosure. You should immediately delete the message 
if you are not the intended recipient. If you have received this email by 
mistake please delete it from your system; you should not copy the message or 
disclose its content to anyone. 

This electronic communication may contain general financial product advice but 
should not be relied upon or construed as a recommendation of any financial 
product. The information has been prepared without taking into account your 
objectives, financial situation or needs. You should consider the Product 
Disclosure Statement relating to the financial product and consult your 
financial adviser before making a decision about whether to acquire, hold or 
dispose of a financial product. 

For further details on the financial product please go to http://www.bt.com.au 

Past performance is not a reliable indicator of future performance.

Reply via email to