docs.rackspace.com/api

Size: px
Start display at page:

Download "docs.rackspace.com/api"

Transcription

1 docs.rackspace.com/api

2 Rackspace Cloud Backup Getting API v1.0 ( ) 2015 Rackspace US, Inc. This document is intended for software developers interested in developing applications using the Rackspace Cloud Backup Application Programming Interface (API). The document is for informational purposes only and is provided AS IS. RACKSPACE MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED, AS TO THE ACCURACY OR COM- PLETENESS OF THE CONTENTS OF THIS DOCUMENT AND RESERVES THE RIGHT TO MAKE CHANGES TO SPECIFICATIONS AND PROD- UCT/SERVICES DESCRIPTION AT ANY TIME WITHOUT NOTICE. RACKSPACE SERVICES OFFERINGS ARE SUBJECT TO CHANGE WITH- OUT NOTICE. USERS MUST TAKE FULL RESPONSIBILITY FOR APPLICATION OF ANY SERVICES MENTIONED HEREIN. EXCEPT AS SET FORTH IN RACKSPACE GENERAL TERMS AND CONDITIONS AND/OR CLOUD TERMS OF SERVICE, RACKSPACE ASSUMES NO LIABILITY WHATSOEVER, AND DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO ITS SERVICES INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NONINFRINGEMENT. Except as expressly provided in any written license agreement from Rackspace, the furnishing of this document does not give you any license to patents, trademarks, copyrights, or other intellectual property. Rackspace, Rackspace logo and Fanatical Support are registered service marks of Rackspace US, Inc. All other product names and trademarks used in this document are for identification purposes only and are property of their respective owners. ii

3 Table of Contents 1. Overview Prerequisites for running examples Pricing and service level Send requests to the API Sending API requests by using curl Copying and pasting curl request examples into a terminal window Service access endpoints Generate an authentication token Create and work with backups List all agents for the user List agent details Create a backup configuration List all backup configurations for an agent Update a backup configuration Start a backup manually Checking backup status List activity for an agent Create a restore configuration Start a restore operation manually Get a restore report Delete a backup configuration Additional resources Document change history Glossary iii

4 List of Tables 2.1. curl command-line options Regionalized service endpoints... 6 iv

5 List of Examples 2.1. Example curl authentication request curl authentication request: JSON Authentication response with partial service catalog showing Cloud Backup endpoints List all agents for the user List agent details Create a backup configuration List all backup configurations for an agent Update a backup configuration Start a backup manually Checking backup status List activity for an agent Create a restore configuration Start a restore manually Get a restore report Delete a backup configuration List backup configuration details v

6 1. Overview The Rackspace Cloud Backup service enables you to select and back up specific files and folders from your cloud server. You can schedule any number of backup jobs and restore to the same system or a different one, which gives you the flexibility and power to work with your schedule and your data. Using the Cloud Backup RESTful API, you can automate backup jobs while provisioning new servers. Merged into a Chef cookbook or in any other automation system, backups are a part of the deployment rather than something to consider and handle later. Key features are as follows: Select the files and folders from your server that you want to back up. Run your backups manually or on a schedule that works for you. See the activity from all your backups, both current and previous. Use AES-256 encryption with a private encryption key known only to you. Restore individual files and folders from a particular date. Save space with incremental backups that save only the changed portions of files. Create an unlimited number of backups. Note Cloud Backup does not take snapshots of your server. To read more about how Cloud Backup differs from snapshots, see "Rackspace Cloud Backup vs. Cloud Server Image Backups" in the Rackspace Knowledge Center. Follow the steps provided in this guide to use the Cloud Backup API to create backups and use them to restore your files and folders. The simple exercises in this guide help you get started with the API by using curl commands. With curl, you send HTTP requests with embedded API calls from the command line. The curl examples in this guide include request and response bodies in JSON format. For more information about curl, see Section 2.1, Sending API requests by using curl [3]. To use the API, it helps to be familiar with HTTP 1.1, RESTful web services, and JSON data serialization format. You can find details about the Cloud Backup API in the Rackspace Cloud Backup Developer Guide at For more details about Cloud Backup, go to This site also offers links to Rackspace official support channels, including phone, chat, and , as well as Knowledge Center articles. 1

7 1.1. Prerequisites for running examples To run the examples in this guide, you must have the following prerequisites: Rackspace Cloud account To sign up for a Rackspace Cloud account, go to the signup page. Rackspace Cloud user name and password, as specified during registration You also need to know your API key. To find your API key, use the following steps: 1. Log in to the Cloud Control Panel ( 2. On the upper-right side of the top navigation pane, click your username. 3. From the menu, select Account Settings. 4. In the Login Details section of the Account Settings page, locate the API Key field and click Show. 5. Copy the value of the API key and paste it into a text editor of your choice. 6. Click Hide to hide the value of the API key Pricing and service level Cloud Backup is part of the Rackspace Cloud and your use of the Cloud Backup API is billed according to the pricing schedule at Information about service level agreements (SLAs) is also available from that link. 2

8 2. Send requests to the API You have several options for sending requests through an API: Developers and testers might prefer to use curl, the command-line tool from curl.haxx.se/. With curl, you can send HTTP requests and receive responses back from the command line. curl is used in this guide. If you like to use a more graphical interface, the REST client for Mozilla Firefox works well for testing and trying out commands. See You can download and install RESTClient, a Java application used to test RESTful web services, from Sending API requests by using curl curl is a command-line tool that is available in UNIX system-based environments and Apple Mac OS X systems, and can be downloaded for Microsoft Windows to interact with REST interfaces. For more information about curl, see curl enables you to transmit and receive HTTP requests and responses from the command line or from within a shell script. As a result, you can work with the REST API directly without using one of the client APIs. The following curl command-line options are used in this guide to run the examples. Table 2.1. curl command-line options Option Description -d Sends the specified data in a POST request to the HTTP server. -i Includes the HTTP header in the output. -H HEADER Specifies an HTTP header in the request. You can specify any number of extra headers. Precede each header with the -H option. -s Specifies silent or quiet mode. No progress or error messages are shown. If your curl command is not generating any output, try replacing the -s option with -i. -X Specifies the request operation to use when communicating with the HTTP server. The specified request is used instead of the default operation, which is GET. For example, -X PUT specifies to use the PUT operation. Note If you have the tools, you can run the curl JSON request examples with the following option to format the output from curl: <curl JSON request example> python -m json.tool. 3

9 2.2. Copying and pasting curl request examples into a terminal window To run the curl request examples shown in this guide, perform the following actions: 1. Copy each example from the HTML version of this guide and paste it into an ASCII text editor (for example, vi or TextEdit). You can click on the small document icon to the right of each request example to select it. 2. Modify each example with your required account information and other information, as detailed in this guide. Note The carriage returns in the curl request examples are escaped with a backslash (\) character. The escape character allows continuation of the command across multiple lines. However, do not include the escape character in the JSON or XML request body within the curl command. 3. After you are finished modifying the text for the curl request example with your information (for example, user name and API key), copy and paste the text into your terminal window. 4. Press Enter to run the curl command. Consider the following example curl authentication request, which is described in detail in Chapter 4, Generate an authentication token [7]. Example 2.1. Example curl authentication request curl -s -X POST \ -H "Content-Type: application/json" \ -d ' "auth": "RAX-KSKEY:apiKeyCredentials": "username": "yourusername", "apikey": "yourapikey" ' python -m json.tool You can see that the lines that are part of the curl command syntax have all been escaped with a backslash (\) to indicate that the command continues on the next line: curl -s -X POST \ -H "Content-Type: application/json" \ -d ' (... lines within the JSON portion of the message are not shown in this example) (... the example shows only lines that are part of curl syntax) 4

10 ' python -m json.tool However, the lines within the JSON portion of the message are not escaped with a backslash, to avoid issues with the JSON processing. ' "auth": "RAX-KSKEY:apiKeyCredentials": "username": "yourusername", "apikey": "yourapikey" ' Tip If you have trouble copying and pasting the examples as described, try typing the entire example on one long line, removing all the backslash line-continuation characters. 5

11 3. Service access endpoints The Cloud Backup service is a regionalized service. The user of the service is responsible for appropriate replication, caching, and overall maintenance of Cloud Backup data across regional boundaries to other Cloud Backup servers. The following table lists the service endpoints for Cloud Backup. To help you decide which regionalized endpoint to use, read about special considerations for choosing a data center in the Knowledge Center article at About Regions. Table 3.1. Regionalized service endpoints Region Dallas/Ft. Worth (DFW) Chicago (ORD) London (LON) Hong Kong (HKG) Northern Virginia (IAD) Sydney (SYD) Endpoint Replace the sample account ID number (which is also called the tenant ID), , with your actual account number that is returned as part of the Cloud Identity service response. You will find the actual account number after the final slash ('/') in the publicurl field returned by the authentication response. Note The Cloud Backup API runs with or without the specification of the account ID number in the endpoint. However, the examples in this guide include the account number in the request URIs. 6

12 4. Generate an authentication token Your first step must always be to generate an authentication token. You must then include the authentication token in each request, in the X-Auth-Token header. Remember to replace the placeholders in the following authentication request example with your information: yourusername Your common Rackspace Cloud user name, as supplied during registration yourapikey Your API key See Section 1.1, Prerequisites for running examples [2] for the steps to use to find your API key. Note This guide uses yourusername and yourapikey for authentication. For information about other supported authentication methods, see Authentication tokens in the Cloud Identity Client Developer Guide. Use the following endpoint to access the Cloud Identity service for authentication, regardless of US or UK identities: Your account may be based in either the US or the UK. This is not determined by your physical location but by the location of the Rackspace retail site that was used to create your account: If your account was created via it is a US-based account. If your account was created via it is a UK-based account. Notice in Example 4.1, curl authentication request: JSON [8] that you authenticate using the URL for the Cloud Identity services identity.api.rackspacecloud.com/v2.0/tokens. The v2.0 component in the URL indicates that you are using version 2.0 of the Cloud Identity API. The curl request uses the -s option for silent or quiet mode (no progress or error messages shown), the -X option to specify the request operation to use when communicating with the HTTP server (instead of using the default operation), and the -d option to send the specified data in a POST request to the HTTP server. If you have the tools, you can run the curl JSON request examples with the following option to format the output from curl: <curl JSON request example> python -m json.tool. 7

13 Example 4.1. curl authentication request: JSON curl -s -X POST \ -H "Content-Type: application/json" \ -d ' "auth": "RAX-KSKEY:apiKeyCredentials": "username": "yourusername", "apikey": "yourapikey" ' python -m json.tool An HTTP status code of 200 (OK) indicates that the authentication request completed successfully. In the authentication response, the authentication token id is returned near the bottom of the following example with an expires attribute that specifies when the token expires. Tokens are valid for a finite duration, typically for 24 hours. Remember to supply your authentication token wherever you see the placeholder yourauthtoken in the examples in this guide. The publicurl endpoints for Cloud Backup (for example dfw.backup.api.rackspacecloud.com/v1.0/123456) are also returned in the authentication response. Your actual account number is after the final slash (/) in the publicurl field (for example in the preceding example endpoint). You must specify your account number in the Cloud Backup API request, wherever you see the placeholder youraccountid specified in the examples in this guide. Example 4.2. Authentication response with partial service catalog showing Cloud Backup endpoints "access": "servicecatalog": [ "endpoints": [ "publicurl": " rackspacecloud.com/v1/123456", "region": "SYD", "tenantid": "123456", "publicurl": " rackspacecloud.com/v1/123456", "region": "DFW", "tenantid": "123456", "publicurl": " rackspacecloud.com/v1/123456", "region": "ORD", "tenantid": "123456", 8

14 "publicurl": " rackspacecloud.com/v1/123456", "region": "IAD", "tenantid": "123456", "publicurl": " rackspacecloud.com/v1/123456", "region": "HKG", "tenantid": "123456" ], "name": "cloudblockstorage", "type": "volume", "endpoints": [ "publicurl": " v1.0/123456", "tenantid": "123456", "publicurl": " com/v1.0/123456", "region": "IAD", "tenantid": "123456", "publicurl": " com/v1.0/123456", "region": "HKG", "tenantid": "123456", "publicurl": " com/v1.0/123456", "region": "SYD", "tenantid": "123456", "publicurl": " com/v1.0/123456", "region": "DFW", "tenantid": "123456", "publicurl": " com/v1.0/123456", "region": "ORD", "tenantid": "123456" ], "name": "cloudbackup", "type": "rax:backup", "endpoints": [ 9

15 "publicurl": " com/v2/123456", "region": "SYD", "tenantid": "123456", "versionid": "2", "versioninfo": " rackspacecloud.com/v2", "versionlist": " rackspacecloud.com/", "publicurl": " com/v2/123456", "region": "DFW", "tenantid": "830866", "versionid": "2", "versioninfo": " rackspacecloud.com/v2", "versionlist": " rackspacecloud.com/", "publicurl": " com/v2/830866", "region": "IAD", "tenantid": "830866", "versionid": "2", "versioninfo": " rackspacecloud.com/v2", "versionlist": " rackspacecloud.com/", "publicurl": " com/v2/830866", "region": "HKG", "tenantid": "830866", "versionid": "2", "versioninfo": " rackspacecloud.com/v2", "versionlist": " rackspacecloud.com/", "publicurl": " com/v2/830866", "region": "ORD", "tenantid": "830866", "versionid": "2", "versioninfo": " rackspacecloud.com/v2", "versionlist": " rackspacecloud.com/" ], "name": "cloudserversopenstack", "type": "compute", ], "token": 10

16 "RAX-AUTH:authenticatedBy": [ "APIKEY" ], "expires": " T07:11:19.488Z", "id": "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx", "tenant": "id": "123456", "name": "123456", "user": "RAX-AUTH:defaultRegion": "DFW", "id": "123456", "name": "yourusername", "roles": [ "description": "A Role that allows a user access to keystone Service methods", "id": "5", "name": "object-store:default", "tenantid": "MossoCloudFS_aaaaaaaa-bbbb-cccc-ddddeeeeeeeeeeee", "description": "A Role that allows a user access to keystone Service methods", "id": "6", "name": "compute:default", "tenantid": "123456", "description": "User Admin Role.", "id": "3", "name": "identity:user-admin" ] After authentication, you can use curl to perform the GET, DELETE, PUT, and POST requests for the Cloud Backup API. 11

17 5. Create and work with backups This chapter contains simple examples of some basic Cloud Backup requests that you will commonly use. Example requests are provided in curl, followed by the response. For more information about all Cloud Backup operations, see the Rackspace Cloud Backup Developer Guide List all agents for the user The agent is an important component of Cloud Backup. You must install the agent on all servers that you want to back up. Documentation about installing agents is available from the link on Rackspace Control Panel under the Backup tab or at After the agent is installed on one or many servers, you can use the Cloud Backup API to configure your backups. Note If your account has the Managed Operations level of support, the Cloud Backup agent might already be installed on your server. If your cloud servers are listed under the Systems tab in the Backup section of the Cloud Control Panel, then the Cloud Backup agent is already installed. If it is not, Rackspace can install it for you. Check with your account manager. Assuming that you initially know nothing about the environment, in order to do anything with the backups, you need to list the agents. After you list them, you can choose the one you want to work with. MachineAgentId is what you need to work with the agent in other requests. The HTTP request must include a header to specify the authentication token. The curl request uses the -s option for silent or quiet mode (no progress or error messages shown) and the -X option to specify the request operation to use when communicating with the HTTP server (instead of using the default operation). If you have the tools, you can run the curl JSON request examples with the following option to format the output from curl: <curl JSON request example> python -m json.tool. An HTTP status code of 200 (OK) indicates that the request succeeded. Example 5.1. List all agents for the user curl -s -X GET user/agents \ -H "X-Auth-Token: yourauthtoken" python -m json.tool [ "AgentVersion": " ", "Architecture": "64-bit", 12

18 "BackupContainer": " com/v1/mossocloudfs_aaaaaaaa-bbbb-cccc-dddd-eeeeeeeeeeee/ z_do_not_delete_cloudbackup_v2_0_aaaaaaaa-bbbb-cccc-dddd-eeeeeeeeeeee", "BackupDatacenter": "DFW", "BackupVaultSize": null, "CleanupAllowed": true, "Datacenter": "DFW", "Flavor": "RaxCloudServer", "HostServerId": "79aa4aa1-cd a6c4-6942b ", "IPAddress": " ", "IsDisabled": false, "IsEncrypted": false, "MachineAgentId": , "MachineName": "web2", "OperatingSystem": "Windows Server 2008 R2", "OperatingSystemVersion": "6.1", "PublicKey": "ExponentHex": 10001, "ModulusHex": "C6054E90E32D2B25E16F3A560E1B4DC580B1E4AB74E0C DD8A1BD F6A526B16C55225D1BE6E0B1265F4085FB2F61B61337F5D32198E5CAFFEA CD50E90517A329146E43B20194C082A9C890060AD07A542FBC035B2A96F9F212C6D94887BECB 5E15F3E55397B975B1896CFC66EBB5DD7D A0E7F669ADB925A7BE4C1ECED1BC9E92DB 768CE76FDC86CCDD04BDF469679FE3261AA66C22AC6263E540B79780AAF09CFC798CDC4D EA4BD1BF511E4881E07C5387DDDBE741E615ACA0C32A738F5B952F1C17051EC3BAF 9F64C629515EA2AF93E6BB450A8B1B3E D5670AF93CFEA649172EDA7AC5E071E2D 3AF0BD", "Status": "Unknown", "TimeOfLastSuccessfulBackup": null, "UseFailoverUri": false, "UseServiceNet": true ] 5.2. List agent details To check whether the agent is online, list the agent's details and check its status. If the agent is not online, Cloud Backup cannot run the backup job. Use MachineAgentId from Section 5.2, List agent details [13] for yourmachineagentid. The HTTP request must include a header to specify the authentication token. The curl request uses the -s option for silent or quiet mode (no progress or error messages shown) and the -X option to specify the request operation to use when communicating with the HTTP server (instead of using the default operation). If you have the tools, you can run the curl JSON request examples with the following option to format the output from curl: <curl JSON request example> python -m json.tool. An HTTP status code of 200 (OK) in the response indicates that the request succeeded. Example 5.2. List agent details curl -s -X GET agent/yourmachineagentid \ -H "X-Auth-Token: yourauthtoken" python -m json.tool 13

19 "AgentVersion": " ", "Architecture": "64-bit", "BackupContainer": " com/v1/mossocloudfs_aaaaaaaa-bbbb-cccc-dddd-eeeeeeeeeeee/ z_do_not_delete_cloudbackup_v2_0_aaaaaaaa-bbbb-cccc-dddd-eeeeeeeeeeee", "BackupDatacenter": "DFW", "BackupVaultSize": "35.3 KB", "CleanupAllowed": true, "Datacenter": "DFW", "Flavor": "RaxCloudServer", "HostServerId": "79aa4aa1-cd a6c4-6942b ", "IPAddress": " ", "IsDisabled": false, "IsEncrypted": false, "MachineAgentId": , "MachineName": "web2", "OperatingSystem": "Windows Server 2008 R2", "OperatingSystemVersion": "6.1", "PublicKey": "ExponentHex": 10001, "ModulusHex": "C6054E90E32D2B25E16F3A560E1B4DC580B1E4AB74E0C DD8A1BD F6A526B16C55225D1BE6E0B1265F4085FB2F61B61337F5D32198E5CAFFEA CD50E90517A329146E43B20194C082A9C890060AD07A542FBC035B2A96F9F212C6D94887BECB 5E15F3E55397B975B1896CFC66EBB5DD7D A0E7F669ADB925A7BE4C1ECED1BC9E92DB 768CE76FDC86CCDD04BDF469679FE3261AA66C22AC6263E540B79780AAF09CFC798CDC4D EA4BD1BF511E4881E07C5387DDDBE741E615ACA0C32A738F5B952F1C17051EC3BAF 9F64C629515EA2AF93E6BB450A8B1B3E D5670AF93CFEA649172EDA7AC5E071E2D 3AF0BD", "Status": "Online", "TimeOfLastSuccessfulBackup": null, "UseFailoverUri": false, "UseServiceNet": true 5.3. Create a backup configuration Create a backup configuration in which you define the following basic items: The name of the backup What you want to back up When you want to back up How often you want to back up Look carefully at the Inclusions and Exclusions sections. Note that each exclusion must be within a folder that is included. If you like, you can programmatically create many configuration files like this with small changes for each server that you create. The HTTP request must include a header to specify the authentication token. The curl request uses the -s option for silent or quiet mode (no progress or error messages shown) and the -X option to specify the request operation to use when communicating with the HTTP server (instead of using the default operation). 14

20 If you have the tools, you can run the curl JSON request examples with the following option to format the output from curl: <curl JSON request example> python -m json.tool. An HTTP status code of 200 (OK) in the response indicates that the request succeeded. Example 5.3. Create a backup configuration curl -s -X POST backup-configuration \ -H "X-Auth-Token: yourauthtoken" \ -H "Content-Type: application/json" \ -d ' "MachineAgentId": , "BackupConfigurationName": "Weekly Website Backup", "IsActive": true, "VersionRetention": 30, "MissedBackupActionId": 1, "Frequency": "Weekly", "StartTimeHour": 7, "StartTimeMinute": 30, "StartTimeAmPm": "PM", "DayOfWeekId": 5, "HourInterval": null, "TimeZoneId": "Eastern Standard Time", "NotifyRecipients": "test@my- -address.com", "NotifySuccess": true, "NotifyFailure": true, "Inclusions": [ "FilePath": "C:\\backup_up_file.txt", "FileItemType": "File", "FilePath": "C:\\backed_up_folder", "FileItemType": "Folder" ], "Exclusions": [ "FilePath": "C:\\backed_up_folder\\excluded_file.txt", "FileItemType": "File" ] ' python -m json.tool "BackupConfigurationId": , "BackupConfigurationName": "Weekly Website Backup", "BackupConfigurationScheduleId": , "BackupPostscript": "", "BackupPrescript": "", "Datacenter": "DFW", "DayOfWeekId": 5, "EncryptionKey": "ExponentHex": 10001, 15

21 "ModulusHex": "C6054E90E32D2B25E16F3A560E1B4DC580B1E4AB74E0C DD8A1BD F6A526B16C55225D1BE6E0B1265F4085FB2F61B61337F5D32198E5CAFFEA CD50E90517A329146E43B20194C082A9C890060AD07A542FBC035B2A96F9F212C6D94887BECB 5E15F3E55397B975B1896CFC66EBB5DD7D A0E7F669ADB925A7BE4C1ECED1BC9E92DB 768CE76FDC86CCDD04BDF469679FE3261AA66C22AC6263E540B79780AAF09CFC798CDC4D EA4BD1BF511E4881E07C5387DDDBE741E615ACA0C32A738F5B952F1C17051EC3BAF 9F64C629515EA2AF93E6BB450A8B1B3E D5670AF93CFEA649172EDA7AC5E071E2D 3AF0BD", "Exclusions": [ "FileId": , "FileItemType": "File", "FilePath": "C:\\backed_up_folder\\excluded_file.txt", "FilePathEncoded": null, "Filter": "Exclude", "ParentId": ], "Flavor": "RaxCloudServer", "Frequency": "Weekly", "HourInterval": null, "Inclusions": [ "FileId": , "FileItemType": "File", "FilePath": "C:\\backup_up_file.txt", "FilePathEncoded": null, "Filter": "Include", "ParentId": , "FileId": , "FileItemType": "Folder", "FilePath": "C:\\backed_up_folder", "FilePathEncoded": null, "Filter": "Include", "ParentId": ], "IsActive": true, "IsDeleted": false, "IsEncrypted": false, "LastRunBackupReportId": null, "LastRunTime": null, "MachineAgentId": , "MachineName": "web2", "MissedBackupActionId": 1, "NextScheduledRunTime": "/Date( )/", "NotifyFailure": true, "NotifyRecipients": "test@my- -address.com", "NotifySuccess": true, "StartTimeAmPm": "PM", "StartTimeHour": 11, "StartTimeMinute": 30, "TimeZoneId": "Eastern Standard Time", "VersionRetention": 30 16

22 5.4. List all backup configurations for an agent To verify that your backup configuration exists, you can list all of the backup configurations for your agent. The output is similar to that in Section 5.3, Create a backup configuration [14]. The HTTP request must include a header to specify the authentication token. The curl request uses the -s option for silent or quiet mode (no progress or error messages shown) and the -X option to specify the request operation to use when communicating with the HTTP server (instead of using the default operation). If you have the tools, you can run the curl JSON request examples with the following option to format the output from curl: <curl JSON request example> python -m json.tool. An HTTP status code of 200 (OK) in the response indicates that the request succeeded. Example 5.4. List all backup configurations for an agent curl -s -X GET backup-configuration/system/youmachineagentid \ -H "X-Auth-Token: yourauthtoken" python -m json.tool [ "BackupConfigurationId": , "BackupConfigurationName": "Weekly Website Backup", "BackupConfigurationScheduleId": , "BackupPostscript": "", "BackupPrescript": "", "Datacenter": "DFW", "DayOfWeekId": 5, "EncryptionKey": "ExponentHex": 10001, "ModulusHex": "C6054E90E32D2B25E16F3A560E1B4DC580B1E4AB74E0C DD8A1BD F6A526B16C55225D1BE6E0B1265F4085FB2F61B61337F5D32198E5CAFFEA CD50E90517A329146E43B20194C082A9C890060AD07A542FBC035B2A96F9F212C6D94887BECB 5E15F3E55397B975B1896CFC66EBB5DD7D A0E7F669ADB925A7BE4C1ECED1BC9E92DB 768CE76FDC86CCDD04BDF469679FE3261AA66C22AC6263E540B79780AAF09CFC798CDC4D EA4BD1BF511E4881E07C5387DDDBE741E615ACA0C32A738F5B952F1C17051EC3BAF 9F64C629515EA2AF93E6BB450A8B1B3E D5670AF93CFEA649172EDA7AC5E071E2D 3AF0BD", "Exclusions": [ "FileId": , "FileItemType": "File", "FilePath": "C:\\backed_up_folder\\excluded_file.txt", "FilePathEncoded": null, "Filter": "Exclude", "ParentId": ], "Flavor": "RaxCloudServer", 17

23 ] "Frequency": "Weekly", "HourInterval": null, "Inclusions": [ "FileId": , "FileItemType": "File", "FilePath": "C:\\backup_up_file.txt", "FilePathEncoded": null, "Filter": "Include", "ParentId": , "FileId": , "FileItemType": "Folder", "FilePath": "C:\\backed_up_folder", "FilePathEncoded": null, "Filter": "Include", "ParentId": ], "IsActive": true, "IsDeleted": false, "IsEncrypted": false, "LastRunBackupReportId": null, "LastRunTime": null, "MachineAgentId": , "MachineName": "web2", "MissedBackupActionId": 1, "NextScheduledRunTime": "/Date( )/", "NotifyFailure": true, "NotifyRecipients": "test@my- -address.com", "NotifySuccess": true, "StartTimeAmPm": "PM", "StartTimeHour": 11, "StartTimeMinute": 30, "TimeZoneId": "Eastern Standard Time", "VersionRetention": Update a backup configuration To schedule the backup for one hour later, for example, you can update the backup configuration that you created earlier. Specify the BackupConfigurationId value in the URI. Send the same JSON content that you used in Section 5.3, Create a backup configuration [14] but make the following changes: Add v2 to BackupConfigurationName. Change StartTimeHour to 8. The HTTP request must include a header to specify the authentication token. The curl request uses the -s option for silent or quiet mode (no progress or error messages shown) and the -X option to specify the request operation to use when communicating with the HTTP server (instead of using the default operation). 18

24 If you have the tools, you can run the curl JSON request examples with the following option to format the output from curl: <curl JSON request example> python -m json.tool. This operation does not return a response body. An HTTP status code of 200 (OK) in the response indicates that the request succeeded. Example 5.5. Update a backup configuration curl -i -X PUT backup-configuration/yourbackupconfigurationid \ -H "X-Auth-Token: yourauthtoken" \ -H "Content-Type: application/json" \ -d ' "MachineAgentId": , "BackupConfigurationName": "Weekly Website Backup v2", "IsActive": true, "VersionRetention": 30, "MissedBackupActionId": 1, "Frequency": "Weekly", "StartTimeHour": 8, "StartTimeMinute": 30, "StartTimeAmPm": "PM", "DayOfWeekId": 5, "HourInterval": null, "TimeZoneId": "Eastern Standard Time", "NotifyRecipients": "test@my- -address.com", "NotifySuccess": true, "NotifyFailure": true, "Inclusions": [ "FilePath": "C:\\backup_up_file.txt", "FileItemType": "File", "FilePath": "C:\\backed_up_folder", "FileItemType": "Folder" ], "Exclusions": [ "FilePath": "C:\\backed_up_folder\\excluded_file.txt", "FileItemType": "File" ] ' python -m json.tool You can verify that the configuration is updated by using the following curl request, specifying the same BackupConfigurationId that you used in the update request. curl -s -X GET backup-configuration/yourbackupconfigurationid \ -H "X-Auth-Token: yourauthtoken" python -m 5.6. Start a backup manually If you do not do anything, Cloud Backup runs the backup at the scheduled time. 19

25 If you want to run the backup once to ensure that it works, you can start the backup manually. Use the BackupConfigurationId to indicate the backup configuration that you want to run. You can run the backup job as many time as you like. A backup is created each time you run the job. The HTTP request must include a header to specify the authentication token. The curl request uses the -i option to send the HTTP response to terminal output and the -X option to specify the correct HTTP method. This operation does not return a response body. An HTTP status code of 200 (OK) in the response indicates that the request succeeded. Example 5.6. Start a backup manually curl -i -X POST backup/action-requested \ -H "X-Auth-Token: yourauthtoken" \ -H "Content-Type: application/json" \ -d ' "Action" : "StartManual", "Id": yourbackupconfigurationid ' The response comes from the server. The number at the end of the response is the ID of the job. HTTP/ OK... Date: Thu, 31 Jul :54:38 GMT When the backup is done, you receive an about the status, as shown in the following example. Receiving the is based on the NotifyRecipients, NotifySuccess, and NotifyFailure parameters that you specify when you create your backup configuration (see Section 5.3, Create a backup configuration [14]). Rackspace Cloud Backup Backed Up: Weekly Website Backup v2 on web2 Status: Completed Started: 31 Jul :54 UTC Completed: 31 Jul :54 UTC Source: web02 Files Searched: 2 (4 KB) Errors Encountered: Checking backup status You can verify whether your backup jobs ran properly, and if they did not, what errors occurred. The HTTP request must include a header to specify the authentication token. 20

26 The curl request uses the -s option for silent or quiet mode (no progress or error messages shown) and the -X option to specify the request operation to use when communicating with the HTTP server (instead of using the default operation). If you have the tools, you can run the curl JSON request examples with the following option to format the output from curl: <curl JSON request example> python -m json.tool. The following example output shows "CurrentState": "Queued". Other valid values for CurrentState are as follows: Completed CompletedWithErrors Failed InProgress Missed Preparing Skipped StartRequested StartScheduled Stopped StopRequested An HTTP status code of 200 (OK) in the response indicates that the request succeeded. Example 5.7. Checking backup status curl -s -X GET backup/yourbackupid \ -H "X-Auth-Token: yourauthtoken" \ -H "Content-Type: application/json python -m json.tool "BackupId": , "BackupConfigurationId": , "CurrentState": "Queued", "BackupConfigurationName": "Weekly Website Backup v2", "MachineAgentId": , "MachineName": "web2", "StateChangeTime": "/Date( )/", "IsEncrypted": false, "EncryptionKey": "ExponentHex": 10001, "ModulusHex": "C6054E90E32D2B25E16F3A560E1B4DC580B1E4AB74E0C DD8A1BD F6A526B16C55225D1BE6E0B1265F4085FB2F61B61337F5D32198E5CAFFEA CD50E90517A329146E43B20194C082A9C890060AD07A542FBC035B2A96F9F212C6D94887BECB 21

27 5E15F3E55397B975B1896CFC66EBB5DD7D A0E7F669ADB925A7BE4C1ECED1BC9E92DB 768CE76FDC86CCDD04BDF469679FE3261AA66C22AC6263E540B79780AAF09CFC798CDC4D EA4BD1BF511E4881E07C5387DDDBE741E615ACA0C32A738F5B952F1C17051EC3BAF 9F64C629515EA2AF93E6BB450A8B1B3E D5670AF93CFEA649172EDA7AC5E071E2D 3AF0BD" 5.8. List activity for an agent You can display all the activities for an agent to find out whether your backups ran successfully or failed. This operation is useful if you do not set notifications when you create your backup configuration (see Backup configuration [29]) and want to create a report about the state of previous backups. The operation lists all in-progress and completed activity for an agent. Activity types are Backup, Cleanup, and Restore. The HTTP request must include a header to specify the authentication token. The curl request uses the -s option for silent or quiet mode (no progress or error messages shown) and the -X option to specify the request operation to use when communicating with the HTTP server (instead of using the default operation). If you have the tools, you can run the curl JSON request examples with the following option to format the output from curl: <curl JSON request example> python -m json.tool. An HTTP status code of 200 (OK) in the response indicates that the request succeeded. Example 5.8. List activity for an agent curl -s -X GET system/activity/youragentid / -H "X-Auth-Token: yourauthtoken" \ -H "Content-Type: application/json" python -m json.tool [, "CurrentState": "Completed", "DestinationDatacenter": "", "DestinationMachineAgentId": 0, "DestinationMachineName": "", "DisplayName": "Cleanup", "ID": , "IsBackupConfigurationDeleted": false, "ParentId": 0, "SourceDatacenter": "DFW", "SourceMachineAgentId": , "SourceMachineName": "web2", "TimeOfActivity": "/Date( )/", "Type": "Cleanup" "CurrentState": "Completed", "DestinationDatacenter": "", "DestinationMachineAgentId": 0, 22

28 ] "DestinationMachineName": "", "DisplayName": "Web2", "ID": , "IsBackupConfigurationDeleted": true, "ParentId": 54020, "SourceDatacenter": "DFW", "SourceMachineAgentId": , "SourceMachineName": "web2", "TimeOfActivity": "/Date( )/", "Type": "Backup" 5.9. Create a restore configuration Now that you have a backup, you can restore it to a different location on your server. You can also restore it to a different server, or to the same folder on the same server. You must set the BackupMachineId, DestinationMachineId, and DestinationPath values properly. BackupId identifies the backup that you want to use to restore. The HTTP request must include a header to specify the authentication token. The curl request uses the -s option for silent or quiet mode (no progress or error messages shown) and the -X option to specify the request operation to use when communicating with the HTTP server (instead of using the default operation). If you have the tools, you can run the curl JSON request examples with the following option to format the output from curl: <curl JSON request example> python -m json.tool. An HTTP status code of 200 (OK) in the response indicates that the request succeeded. Example 5.9. Create a restore configuration curl -s -X PUT restore / -H "X-Auth-Token: yourauthtoken" \ -H "Content-Type: application/json" \ -d ' "BackupId": , "BackupMachineId": , "DestinationMachineId": , "DestinationPath": "C:\\FolderPathForRestore\\", "OverwriteFiles": false ' python -m json.tool "RestoreId": 1394, "BackupId": , "DestinationMachineId": , "OverwriteFiles": false, "BackupConfigurationId": , "BackupConfigurationName": "Weekly Website Backup v2", "BackupRestorePoint": "\Date( )\", "BackupMachineId": , "BackupMachineName": "TestWindows1", "BackupFlavor": "RaxCloudServer", 23

29 "DestinationMachineName": "TestWindows2", "DestinationPath": "C:\\FolderPathForRestore\\", "IsEncrypted": false, "EncryptedPassword": null, "PublicKey": "ExponentHex": 10001, "ModulusHex": "C6054E90E32D2B25E16F3A560E1B4DC580B1E4AB74E0C DD8A1BD F6A526B16C55225D1BE6E0B1265F4085FB2F61B61337F5D32198E5CAFFEA CD50E90517A329146E43B20194C082A9C890060AD07A542FBC035B2A96F9F212C6D94887BECB 5E15F3E55397B975B1896CFC66EBB5DD7D A0E7F669ADB925A7BE4C1ECED1BC9E92DB 768CE76FDC86CCDD04BDF469679FE3261AA66C22AC6263E540B79780AAF09CFC798CDC4D EA4BD1BF511E4881E07C5387DDDBE741E615ACA0C32A738F5B952F1C17051EC3BAF 9F64C629515EA2AF93E6BB450A8B1B3E D5670AF93CFEA649172EDA7AC5E071E2D 3AF0BD", "RestoreStateId": Start a restore operation manually You can manually run a restore operation that is based on a restore configuration. Use the RestoreId that was returned in Section 5.9, Create a restore configuration [23]. The following example is for an unencrypted restore operation. For an encrypted restore operation, you add the EncryptedPassword parameter with its value. The HTTP request must include a header to specify the authentication token. The curl request uses the -s option for silent or quiet mode (no progress or error messages shown) and the -X option to specify the request operation to use when communicating with the HTTP server (instead of using the default operation). This operation does not return a response body. An HTTP status code of 204 (No Content) in the response indicates that the request succeeded. Example Start a restore manually curl -s -X POST https: //dfw.backup.api.rackspacecloud.com/v1.0/youraccountid/ restore/action-requested \ -H "X-Auth-Token: yourauthtoken" \ -H "Content-Type: application/json" \ -d '"Action": "StartManual", "Id": 1394 ' When the restore is complete, you receive an about the status, as shown in the following example. Receiving the is based on the NotifyRecipients, NotifySuccess, and NotifyFailure parameters that you specify when you create your backup configuration (see Section 5.3, Create a backup configuration [14]). Rackspace Cloud Backup Status: Completed Started: 01 Aug :40 UTC Completed: 01 Aug :40 UTC Destination: C:\\FolderPathForRestore\\ Files Restored: 2 (4 KB) Errors Encountered: 0 24

30 5.11. Get a restore report You can request a restore report that provides information about the restore operation and tells you if the operation ran successfully. The HTTP request must include a header to specify the authentication token. The curl request uses the -s option for silent or quiet mode (no progress or error messages shown) and the -X option to specify the request operation to use when communicating with the HTTP server (instead of using the default operation). If you have the tools, you can run the curl JSON request examples with the following option to format the output from curl: <curl JSON request example> python -m json.tool. An HTTP status code of 200 (OK) in the response indicates that the request succeeded. Example Get a restore report curl -s -X GET restore/report/yourrestoreid \ -H "X-Auth-Token: yourauthtoken" \ -H "Content-Type: application/json" python -m json.tool "BackupConfigurationId": , "BackupConfigurationName": "Weekly Website Backup v2", "BackupReportId": , "CompletedTime": "/Date( )/", "Diagnostics": "No errors", "Duration": "00:00:00", "ErrorList": [], "NumBytesRestored": "4 MB", "NumErrors": "0", "NumFilesRestored": "2", "OriginatingComputerName": "web02", "Reason": "Success", "RestoreDestination": "TestWindows2", "RestoreDestinationMachineId": , "RestorePoint": "/Date( )/", "StartTime": "/Date( )/", "State": "Completed" Cloud Backup reports success. You can also check the folder listings on your server Delete a backup configuration You can delete the backup configuration file and verify that it was removed. Note Similarly, you can also delete a restore configuration by using the operation to delete a restore configuration. 25

31 The HTTP request must include a header to specify the authentication token. The curl request uses the -i option to send the HTTP response to terminal output and the -X option to specify the correct HTTP method. This operation does not return a response body. An HTTP status code of 200 (OK) in the response indicates that the request succeeded. Example Delete a backup configuration curl -i -X DELETE 0/yourAccountID/backup-configuration/yourBackupConfigurationID \ -H "X-Auth-Token: yourauthtoken" To verify that the backup configuration is deleted, list the backup configuration details to see IsDeleted: True. Example List backup configuration details curl -s -X GET backup-configuration/yourbackupconfigurationid \ -H "X-Auth-Token: yourauthtoken" python -m json.tool "BackupConfigurationId": , "BackupConfigurationName": "Weekly Website Backup v2",... "IsDeleted": true,... 26

32 6. Additional resources For information about all Cloud Backup API operations, see the Rackspace Cloud Backup Developer Guide at All you need to get started with the Cloud Backup API is in this getting started guide, the developer guide, and your Rackspace Cloud account. For additional information about Cloud Backup, see the Knowledge Center, and especially, the Knowledge Center article Best Practices for Cloud Backup. The official support channels (phone, chat, , forums, and knowledge base articles) for Cloud Backup are available through the Rackspace Cloud website at Rackspace welcomes feedback, comments, and bug reports at If the Cloud Backup system is not functioning to your expectations, you can review the system status page at This page is updated to reflect up-to-date information about the system s current health and status. Visit the Product Feedback Forum and tell us what you think about Cloud Backup. You can follow Rackspace updates and announcements via Twitter at This API uses standard HTTP 1.1 response codes as documented at 27

33 7. Document change history This version of the guide replaces and obsoletes all earlier versions. The most recent changes are described in the following table: Revision Date March 18, 2015 March 4, 2015 January 14, 2015 August 12, 2014 Summary of Changes Corrected the curl example in Section 5.6, Start a backup manually [19] by changing action-request to action-requested at the end of the endpoint. Removed the London endpoint, since Rackspace now has one global endpoint for authentication using the Rackspace Cloud Identity service. See Chapter 4, Generate an authentication token [7]. Added a note that includes a link to additional authentication methods, including multi-factor authentication, in Chapter 4, Generate an authentication token [7]. Initial publishing of this guide. 28

34 Glossary Agent The application that is installed on the server that knows how to perform backups and restores. Backup A group of folders, files, or both stored on Cloud Backup for a particular server and configuration. Backup configuration The definition of what is going to be backed up and when. Restore The process of bringing your system back to a previously saved state. Restore configuration The definition of what is going to be restored and where. 29

docs.rackspace.com/api

docs.rackspace.com/api docs.rackspace.com/api Rackspace Cloud Block Storage Getting Started (2015-07-27) 2015 Rackspace US, Inc. This document is intended for software developers interested in developing applications using the

More information

docs.rackspace.com/api

docs.rackspace.com/api docs.rackspace.com/api Rackspace Cloud Backup Developer API v1.0 (2015-06-30) 2015 Rackspace US, Inc. This document is intended for software developers interested in developing applications using the Rackspace

More information

docs.rackspace.com/api

docs.rackspace.com/api docs.rackspace.com/api Rackspace Cloud Backup Release (2015-09-09) 2015 Rackspace US, Inc. This document is intended for software developers who are interested in developing applications using the Rackspace

More information

docs.rackspace.com/api

docs.rackspace.com/api docs.rackspace.com/api Rackspace Cloud Big Data Getting Started API v2.0 (2015-06-30) 2015 Rackspace US, Inc. This guide is intended for software developers interested in developing applications using

More information

How To Create A Port On A Neutron.Org Server On A Microsoft Powerbook 2.5.2 (Networking) On A Macbook 2 (Netware) On An Ipad Or Ipad 2.2.2 On A

How To Create A Port On A Neutron.Org Server On A Microsoft Powerbook 2.5.2 (Networking) On A Macbook 2 (Netware) On An Ipad Or Ipad 2.2.2 On A docs.rackspace.com/api Cloud Networks Getting Started (2015-06-15) 2015 Rackspace US, Inc. This document is for software developers who develop applications by using Rackspace Cloud Networks, which is

More information

docs.rackspace.com/api

docs.rackspace.com/api docs.rackspace.com/api Rackspace Cloud Big Data Release (2015-06-30) 2015 Rackspace US, Inc. This document is intended for software developers who are interested in developing applications using the Rackspace

More information

docs.rackspace.com/api

docs.rackspace.com/api docs.rackspace.com/api Rackspace Cloud Big Data Developer API v1.0 (2015-04-23) 2015 Rackspace US, Inc. This guide is intended for software developers interested in developing applications using the Rackspace

More information

rackspace.com/cloud/private

rackspace.com/cloud/private TM rackspace.com/cloud/private Rackspace Private Cloud Active v 4.0 (2013-06-25) Copyright 2013 Rackspace All rights reserved. This document is intended to assist Rackspace Private Cloud customers in updating

More information

docs.rackspace.com/api

docs.rackspace.com/api docs.rackspace.com/api Rackspace Cloud Big Data Developer API v1.0 (2015-04-23) 2015 Rackspace US, Inc. This guide is intended for software developers interested in developing applications using the Rackspace

More information

RackConnect User Guide

RackConnect User Guide RackConnect User Guide Updated: November 8, 2011 RackConnect User Guide Page 2 of 15 DISCLAIMER This RackConnect User Guide (the Guide ) is for informational purposes only and is provided AS IS. The information

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every

More information

Dell Statistica Document Management System (SDMS) Installation Instructions

Dell Statistica Document Management System (SDMS) Installation Instructions Dell Statistica Document Management System (SDMS) Installation Instructions 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Parallels Panel. Parallels Small Business Panel 10.2: User's Guide. Revision 1.0

Parallels Panel. Parallels Small Business Panel 10.2: User's Guide. Revision 1.0 Parallels Panel Parallels Small Business Panel 10.2: User's Guide Revision 1.0 Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax:

More information

Audit Management Reference

Audit Management Reference www.novell.com/documentation Audit Management Reference ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

CaseWare Time. CaseWare Cloud Integration Guide. For Time 2015 and CaseWare Cloud

CaseWare Time. CaseWare Cloud Integration Guide. For Time 2015 and CaseWare Cloud CaseWare Time CaseWare Cloud Integration Guide For Time 2015 and CaseWare Cloud Copyright and Trademark Notice Copyright. 2015 CaseWare International Inc. ( CWI ). All Rights Reserved. Use, duplication,

More information

How To Install Caarcserve Backup Patch Manager 27.3.2.2 (Carcserver) On A Pc Or Mac Or Mac (Or Mac)

How To Install Caarcserve Backup Patch Manager 27.3.2.2 (Carcserver) On A Pc Or Mac Or Mac (Or Mac) CA ARCserve Backup Patch Manager for Windows User Guide r16 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

CA Spectrum and CA Service Desk

CA Spectrum and CA Service Desk CA Spectrum and CA Service Desk Integration Guide CA Spectrum 9.4 / CA Service Desk r12 and later This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter

More information

Dell Statistica 13.0. Statistica Enterprise Installation Instructions

Dell Statistica 13.0. Statistica Enterprise Installation Instructions Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or

More information

docs.rackspace.com/api

docs.rackspace.com/api docs.rackspace.com/api Rackspace Cloud Feeds Developer API v1.0 (2015-11-16) 2015 Rackspace US, Inc. This document is intended for software developers interested in developing applications using the Rackspace

More information

DocAve 6 Service Pack 1 Job Monitor

DocAve 6 Service Pack 1 Job Monitor DocAve 6 Service Pack 1 Job Monitor Reference Guide Revision C Issued September 2012 1 Table of Contents About Job Monitor... 4 Submitting Documentation Feedback to AvePoint... 4 Before You Begin... 5

More information

Security Analytics Engine 1.0. Help Desk User Guide

Security Analytics Engine 1.0. Help Desk User Guide 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Installation Guide for Pulse on Windows Server 2012

Installation Guide for Pulse on Windows Server 2012 MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

CA Nimsoft Service Desk

CA Nimsoft Service Desk CA Nimsoft Service Desk Configure Outbound Web Services 7.13.7 Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and is subject

More information

Installation Guide for Pulse on Windows Server 2008R2

Installation Guide for Pulse on Windows Server 2008R2 MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

Novell ZENworks 10 Configuration Management SP3

Novell ZENworks 10 Configuration Management SP3 AUTHORIZED DOCUMENTATION Software Distribution Reference Novell ZENworks 10 Configuration Management SP3 10.3 November 17, 2011 www.novell.com Legal Notices Novell, Inc., makes no representations or warranties

More information

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Windows 2000, Windows Server 2003 5.0 11293743 Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Copyright

More information

SafeNet Authentication Manager Express. Upgrade Instructions All versions

SafeNet Authentication Manager Express. Upgrade Instructions All versions SafeNet Authentication Manager Express Upgrade Instructions All versions www.safenet-inc.com 4690 Millennium Drive, Belcamp, Maryland 21017 USA Telephone: +1 410 931 7500 or 1 800 533 3958 www.safenet-inc.com

More information

NetBak Replicator 4.0 User Manual Version 1.0

NetBak Replicator 4.0 User Manual Version 1.0 NetBak Replicator 4.0 User Manual Version 1.0 Copyright 2012. QNAP Systems, Inc. All Rights Reserved. 1 NetBak Replicator 1. Notice... 3 2. Install NetBak Replicator Software... 4 2.1 System Requirements...

More information

Fairsail REST API: Guide for Developers

Fairsail REST API: Guide for Developers Fairsail REST API: Guide for Developers Version 1.02 FS-API-REST-PG-201509--R001.02 Fairsail 2015. All rights reserved. This document contains information proprietary to Fairsail and may not be reproduced,

More information

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

DameWare Server. Administrator Guide

DameWare Server. Administrator Guide DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx

More information

Dell One Identity Manager 7.0. Help Desk Module Administration Guide

Dell One Identity Manager 7.0. Help Desk Module Administration Guide Dell 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure

More information

Technical Note. BlackBerry Business Cloud Services

Technical Note. BlackBerry Business Cloud Services BlackBerry Business Cloud Services Migrating User Accounts from the Hosted BlackBerry for Microsoft Exchange Online to BlackBerry Business Cloud Services Technical Note Published: 2012-07-20 SWD-20120720144649963

More information

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

WhatsUp Gold v16.2 Installation and Configuration Guide

WhatsUp Gold v16.2 Installation and Configuration Guide WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

Application Interface Services Server for Mobile Enterprise Applications Configuration Guide Tools Release 9.2

Application Interface Services Server for Mobile Enterprise Applications Configuration Guide Tools Release 9.2 [1]JD Edwards EnterpriseOne Application Interface Services Server for Mobile Enterprise Applications Configuration Guide Tools Release 9.2 E61545-01 October 2015 Describes the configuration of the Application

More information

Usage Analysis Tools in SharePoint Products and Technologies

Usage Analysis Tools in SharePoint Products and Technologies Usage Analysis Tools in SharePoint Products and Technologies Date published: June 9, 2004 Summary: Usage analysis allows you to track how websites on your server are being used. The Internet Information

More information

CA Nimsoft Service Desk

CA Nimsoft Service Desk CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Oracle WebCenter Content Service for Microsoft Exchange

Oracle WebCenter Content Service for Microsoft Exchange Oracle WebCenter Content Service for Microsoft Exchange Installation and Upgrade Guide 10g Release 3 (10.3) November 2008 Oracle WebCenter Content Service for Microsoft Exchange Installation and Upgrade

More information

QAD Enterprise Applications. Training Guide Demand Management 6.1 Technical Training

QAD Enterprise Applications. Training Guide Demand Management 6.1 Technical Training QAD Enterprise Applications Training Guide Demand Management 6.1 Technical Training 70-3248-6.1 QAD Enterprise Applications February 2012 This document contains proprietary information that is protected

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About

More information

Administration Quick Start

Administration Quick Start www.novell.com/documentation Administration Quick Start ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration

Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration February 2015 This guide describes how to configure Dell One Identity Cloud Access Manager to communicate with a Dell

More information

CA NetQoS Performance Center

CA NetQoS Performance Center CA NetQoS Performance Center Install and Configure SSL for Windows Server 2008 Release 6.1 (and service packs) This Documentation, which includes embedded help systems and electronically distributed materials,

More information

GFI Product Manual. Outlook Connector User Manual

GFI Product Manual. Outlook Connector User Manual GFI Product Manual Outlook Connector User Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with no

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Symantec NetBackup Backup, Archive, and Restore Getting Started Guide. Release 7.5

Symantec NetBackup Backup, Archive, and Restore Getting Started Guide. Release 7.5 Symantec NetBackup Backup, Archive, and Restore Getting Started Guide Release 7.5 Symantec NetBackup Backup, Archive, and Restore Getting Started Guide The software described in this book is furnished

More information

Microsoft Dynamics GP 2010. SQL Server Reporting Services Guide

Microsoft Dynamics GP 2010. SQL Server Reporting Services Guide Microsoft Dynamics GP 2010 SQL Server Reporting Services Guide April 4, 2012 Copyright Copyright 2012 Microsoft. All rights reserved. Limitation of liability This document is provided as-is. Information

More information

2X Cloud Portal v10.5

2X Cloud Portal v10.5 2X Cloud Portal v10.5 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

Synchronization Agent Configuration Guide

Synchronization Agent Configuration Guide SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012476-001, Revision A Release Date July 2014 Trademarks All intellectual property

More information

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide Dell Backup Plug-in for Advanced Encryption 2.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

NetBackup Backup, Archive, and Restore Getting Started Guide

NetBackup Backup, Archive, and Restore Getting Started Guide NetBackup Backup, Archive, and Restore Getting Started Guide UNIX, Windows, and Linux Release 6.5 Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Copyright 2007 Symantec Corporation.

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps

Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps May 2015 This guide includes: What is OAuth v2.0? What is OpenID Connect? Example: Providing OpenID Connect SSO to a Salesforce.com

More information

TIBCO Spotfire Automation Services 6.5. Installation and Deployment Manual

TIBCO Spotfire Automation Services 6.5. Installation and Deployment Manual TIBCO Spotfire Automation Services 6.5 Installation and Deployment Manual Revision date: 17 April 2014 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED

More information

TIBCO ActiveMatrix BusinessWorks Plug-in for TIBCO Managed File Transfer Software Installation

TIBCO ActiveMatrix BusinessWorks Plug-in for TIBCO Managed File Transfer Software Installation TIBCO ActiveMatrix BusinessWorks Plug-in for TIBCO Managed File Transfer Software Installation Software Release 6.0 November 2015 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS

More information

Synchronization Tool. Administrator Guide

Synchronization Tool. Administrator Guide Synchronization Tool Administrator Guide Synchronization Tool Administrator Guide Documentation version: 1.5 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec,

More information

EMC Data Protection Search

EMC Data Protection Search EMC Data Protection Search Version 1.0 Security Configuration Guide 302-001-611 REV 01 Copyright 2014-2015 EMC Corporation. All rights reserved. Published in USA. Published April 20, 2015 EMC believes

More information

formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide

formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656

More information

Automating client deployment

Automating client deployment Automating client deployment 1 Copyright Datacastle Corporation 2014. All rights reserved. Datacastle is a registered trademark of Datacastle Corporation. Microsoft Windows is either a registered trademark

More information

TABLE OF CONTENTS. Copyright Pro Softnet Corporation. All rights reserved. 2

TABLE OF CONTENTS. Copyright Pro Softnet Corporation. All rights reserved. 2 Last modified on 08.11.2011 TABLE OF CONTENTS Introduction... 4 Features... 5 General Features... 5 Backup Features... 5 Restore Features... 6 Link for Application Download... 6 Install IBackup for Mac...

More information

How To Set Up Dataprotect

How To Set Up Dataprotect How To Set Up Dataprotect This document will show you how to install and configure your computer for a Typical installation. If you have questions about configuring a Custom installation please contact

More information

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1 Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite

More information

Server Installation Guide ZENworks Patch Management 6.4 SP2

Server Installation Guide ZENworks Patch Management 6.4 SP2 Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch

More information

Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010

Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 This document describes the different types of Unisphere management stations and tells how to install

More information

Deploying System Center 2012 R2 Configuration Manager

Deploying System Center 2012 R2 Configuration Manager Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.

More information

OUTLOOK ANYWHERE CONNECTION GUIDE FOR USERS OF OUTLOOK 2010

OUTLOOK ANYWHERE CONNECTION GUIDE FOR USERS OF OUTLOOK 2010 OUTLOOK ANYWHERE CONNECTION GUIDE FOR USERS OF OUTLOOK 2010 CONTENTS What is Outlook Anywhere? Before you begin How do I configure Outlook Anywhere with Outlook 2010? How do I use Outlook Anywhere? I already

More information

CA VPN Client. User Guide for Windows 1.0.2.2

CA VPN Client. User Guide for Windows 1.0.2.2 CA VPN Client User Guide for Windows 1.0.2.2 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your

More information

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

EMC NetWorker Module for Microsoft Exchange Server Release 5.1

EMC NetWorker Module for Microsoft Exchange Server Release 5.1 EMC NetWorker Module for Microsoft Exchange Server Release 5.1 Installation Guide P/N 300-004-750 REV A02 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright

More information

TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual

TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual TIBCO Spotfire Web Player 6.0 Installation and Configuration Manual Revision date: 12 November 2013 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED

More information

Acronis Backup & Recovery 11.5 Quick Start Guide

Acronis Backup & Recovery 11.5 Quick Start Guide Acronis Backup & Recovery 11.5 Quick Start Guide Applies to the following editions: Advanced Server for Windows Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server

More information

JD Edwards EnterpriseOne Tools. 1 Understanding JD Edwards EnterpriseOne Business Intelligence Integration. 1.1 Oracle Business Intelligence

JD Edwards EnterpriseOne Tools. 1 Understanding JD Edwards EnterpriseOne Business Intelligence Integration. 1.1 Oracle Business Intelligence JD Edwards EnterpriseOne Tools Embedded Business Intelligence for JD Edwards EnterpriseOne Release 8.98 Update 4 E21426-02 March 2011 This document provides instructions for using Form Design Aid to create

More information

Remote Control 5.1.2. Tivoli Endpoint Manager - TRC User's Guide

Remote Control 5.1.2. Tivoli Endpoint Manager - TRC User's Guide Tivoli Remote Control 5.1.2 Tivoli Endpoint Manager - TRC User's Guide Tivoli Remote Control 5.1.2 Tivoli Endpoint Manager - TRC User's Guide Note Before using this information and the product it supports,

More information

Strong Authentication for Juniper Networks SSL VPN

Strong Authentication for Juniper Networks SSL VPN Strong Authentication for Juniper Networks SSL VPN with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard

More information

Salesforce Files Connect Implementation Guide

Salesforce Files Connect Implementation Guide Salesforce Files Connect Implementation Guide Salesforce, Winter 16 @salesforcedocs Last updated: December 10, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered

More information

CTERA Agent for Mac OS-X

CTERA Agent for Mac OS-X User Guide CTERA Agent for Mac OS-X June 2014 Version 4.1 Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Microsoft Dynamics GP. Engineering Data Management Integration Administrator s Guide

Microsoft Dynamics GP. Engineering Data Management Integration Administrator s Guide Microsoft Dynamics GP Engineering Data Management Integration Administrator s Guide Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is

More information

Windows Azure Pack Installation and Initial Configuration

Windows Azure Pack Installation and Initial Configuration Windows Azure Pack Installation and Initial Configuration Windows Server 2012 R2 Hands-on lab In this lab, you will learn how to install and configure the components of the Windows Azure Pack. To complete

More information

Centrify Mobile Authentication Services

Centrify Mobile Authentication Services Centrify Mobile Authentication Services SDK Quick Start Guide 7 November 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject

More information

Workflow approval via email

Workflow approval via email Microsoft Dynamics AX Workflow approval via email White Paper This document highlights the functionality in Microsoft Dynamics AX 2012 R2 that allows workflow to be configured so that a user can take approval

More information

Dell Enterprise Reporter 2.5. Configuration Manager User Guide

Dell Enterprise Reporter 2.5. Configuration Manager User Guide Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license

More information

2.6.1 Creating an Acronis account... 11 2.6.2 Subscription to Acronis Cloud... 11. 3 Creating bootable rescue media... 12

2.6.1 Creating an Acronis account... 11 2.6.2 Subscription to Acronis Cloud... 11. 3 Creating bootable rescue media... 12 USER'S GUIDE Table of contents 1 Introduction...3 1.1 What is Acronis True Image 2015?... 3 1.2 New in this version... 3 1.3 System requirements... 4 1.4 Install, update or remove Acronis True Image 2015...

More information

VMware/Hyper-V Backup Plug-in User Guide

VMware/Hyper-V Backup Plug-in User Guide VMware/Hyper-V Backup Plug-in User Guide COPYRIGHT No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying,

More information

G-Lock EasyMail7. Admin Guide. Client-Server Email Marketing Solution for Windows. Copyright G-Lock Software. All Rights Reserved.

G-Lock EasyMail7. Admin Guide. Client-Server Email Marketing Solution for Windows. Copyright G-Lock Software. All Rights Reserved. G-Lock EasyMail7 Client-Server Email Marketing Solution for Windows Admin Guide Copyright G-Lock Software. All Rights Reserved. 1 Table of Contents This document is your admin guide for G-Lock EasyMail7

More information

Microsoft Dynamics CRM Adapter for Microsoft Dynamics GP

Microsoft Dynamics CRM Adapter for Microsoft Dynamics GP Microsoft Dynamics Microsoft Dynamics CRM Adapter for Microsoft Dynamics GP May 2010 Find updates to this documentation at the following location. http://go.microsoft.com/fwlink/?linkid=162558&clcid=0x409

More information

Good Share Client User Guide for ios Devices

Good Share Client User Guide for ios Devices Good Share Client User Guide for ios Devices Product Version: 3.1.3 Doc Rev 3.1 Last Updated: 24-Feb-15 Good Share TM Table of Contents Introducing Good Share 1 Installing the Good Share App 1 Getting

More information

EMC ApplicationXtender Server

EMC ApplicationXtender Server EMC ApplicationXtender Server 6.5 Monitoring Guide P/N 300-010-560 A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 1994-2010 EMC Corporation. All

More information

Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server

Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6.1

SafeGuard Enterprise Web Helpdesk. Product version: 6.1 SafeGuard Enterprise Web Helpdesk Product version: 6.1 Document date: February 2014 Contents 1 SafeGuard web-based Challenge/Response...3 2 Scope of Web Helpdesk...4 3 Installation...5 4 Allow Web Helpdesk

More information

VMware Software Manager - Download Service User's Guide

VMware Software Manager - Download Service User's Guide VMware Software Manager - Download Service User's Guide VMware Software Manager 1.1 This document supports the version of each product listed and supports all subsequent versions until the document is

More information

vcloud Air Platform Programmer's Guide

vcloud Air Platform Programmer's Guide vcloud Air Platform Programmer's Guide vcloud Air OnDemand 5.7 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Integrating Symantec Endpoint Protection

Integrating Symantec Endpoint Protection Integrating Symantec Endpoint Protection EventTracker Version 7.x Publication Date: Nov 8, 2013 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com About this Guide This guide provides

More information

Cloud Elements ecommerce Hub Provisioning Guide API Version 2.0 BETA

Cloud Elements ecommerce Hub Provisioning Guide API Version 2.0 BETA Cloud Elements ecommerce Hub Provisioning Guide API Version 2.0 BETA Page 1 Introduction The ecommerce Hub provides a uniform API to allow applications to use various endpoints such as Shopify. The following

More information

HP IMC Firewall Manager

HP IMC Firewall Manager HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Advanced Service Design

Advanced Service Design vcloud Automation Center 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information