4 access credentials for source, 5 when to validate, Access credentials for source – Acronis Backup for Linux Server - User Guide User Manual

Page 138: When to validate

Advertising
background image

138

Copyright © Acronis International GmbH, 2002-2014

To select a network share, expand the Network folders group, select the required networked
machine and then click the shared folder. If the network share requires access credentials,
the program will ask for them.

To select a folder stored on NFS share, expand the NFS drives group and click the folder.

To select FTP or SFTP server, expand the corresponding group and click the appropriate
folder on the server.

According to the original FTP specification, credentials required for access to FTP servers are
transferred through a network as plaintext. This means that the user name and password can be
intercepted by an eavesdropper using a packet sniffer.

To assist you with choosing the right vault, the table displays the names of the archives
contained in each vault you select. While you are reviewing the location content, archives can be
added, deleted or modified by another user or by the program itself according to scheduled
operations. Use the Refresh button to refresh the list of archives.

2. Click OK.

8.1.4 Access credentials for source

Specify the credentials required for access to the location where the backup archive is stored.

To specify credentials

1. Select one of the following:

Use the task credentials
The software will access the location using the credentials of the task account specified in the
Task parameters section.

Use the following credentials
The software will access the location using the credentials you specify. Use this option if the
task account does not have access permissions to the location. You might need to provide
special credentials for a network share or a storage node vault.
Specify:

User name. When entering the name of an Active Directory user account, be sure to also
specify the domain name (DOMAIN\Username or Username@domain).

Password. The password for the account.

2. Click OK.

According to the original FTP specification, credentials required for access to FTP servers are transferred
through a network as plaintext. This means that the user name and password can be intercepted by an
eavesdropper using a packet sniffer.

8.1.5 When to validate

As validation is a resource-intensive operation, it makes sense to schedule validation to the managed
machine's off-peak period. On the other hand, if you prefer to be immediately informed whether the
data is not corrupted and can be successfully recovered, consider starting validation right after the
task creation.

Choose one of the following:

Now - to start the validation task right after its creation, that is, after clicking OK on the
Validation page.

Later - to start the one-time validation task, at the date and time you specify.

Advertising