Backup and Recovery Connection Profiles
The following topics describe connection profiles for backup and recovery services:
ConnectionProfile:AWS BackupLink copied to clipboard
AWS Backup enables you to back up and restore your data to the Amazon cloud.
For more information about this plug-in, see Control-M for AWS Backup.
The following examples show how to define a connection profile for an AWS Backup job:
-
This JSON defines an authentication based on an AWS access key and secret:
CopyCopied to clipboard{
"AWS_BACK":
{
"Type": "ConnectionProfile:AWS Backup",
"AWS Backup URL": "https://backup.{{AWSRegion}}.amazonaws.com.",
"AWS Region": "us-east-1",
"Authentication": "Secret",
"AWS Access Key": "ZKIATY7B2LKB2JQ85I6D",
"AWS Secret": "*****",
"Connection Timeout": "20",
"Description": "",
"Centralized": true
}
} -
This JSON defines an authentication based on an AWS IAM role from inside an Amazon EC2 virtual machine (instance).
CopyCopied to clipboard{
"AWS_BAK_IAM":
{
"Type": "ConnectionProfile:AWS Backup",
"AWS Backup URL": "https://backup.{{AWSRegion}}.amazonaws.com",
"AWS Region": "us-east-1",
"Authentication": "NoSecret",
"IAM Role": "arn:aws:iam::122343212345:role/Amazon12SSMRoleForInstancesQuickSetup",
"Connection Timeout": "20",
"Description": "",
"Centralized": true
}
}
The following table describes the AWS Backup connection profile parameters.
Parameter |
Description |
---|---|
AWS Backup URL |
Determines the authentication endpoint for AWS Backup, based on the following format: https://backup.{{AWS_Region}}.amazonaws.com For more information about regional endpoints available for the AWS Batch service, refer to the AWS documentation. |
AWS Region |
Determines the AWS region where the job is located. us-east-2 |
Authentication |
Determines one of the following authentication methods:
|
AWS Access Key |
Defines the access key assigned to the account with the relevant permissions to the AWS service. |
AWS Secret |
Defines the secret access key assigned to the account with the relevant permissions to the AWS service. You can use Secrets in Code to hide this value in the code. |
IAM Role |
Defines the Identity and Access Management (IAM) role name for the AWS service connection. |
Connection Timeout |
Determines the number of seconds to wait after Control-M initiates a connection request before a timeout occurs. Default: 20 |
Centralized |
Determines whether to create a centralized connection profile, which is stored in the Control-M/EM database and is available to all Agents. You must set this parameter to true. |
ConnectionProfile:AWS DataSyncLink copied to clipboard
AWS DataSync enables you to enables you to move large amounts of data between on-premises storage and AWS storage services, as well as between AWS storage services.
For more information about this plug-in, see Control-M for AWS DataSync.
The following examples show how to define a connection profile for an AWS DataSync job:
-
This JSON defines an authentication based on an AWS access key and secret:
CopyCopied to clipboard{
"DATASYNC":
{
"Type": "ConnectionProfile:AWS DataSync",
"AWS Logs URL": "https://logs.AwsRegion.amazonaws.com",
"AWS DataSync URL": "https://datasync.AwsRegion.amazonaws.com",
"AWS Region": "us-east-1",
"Authentication": "Secret",
"AWS Access Key": "ZKIATY7B2LKB2JQ85I6D",
"AWS Secret": "*****",
"Connection Timeout": "20",
"Description": "",
"Centralized": true
}
} -
This JSON defines an authentication based on an AWS IAM role from inside an Amazon EC2 virtual machine (instance).
CopyCopied to clipboard{
"DATASYNC":
{
"Type": "ConnectionProfile:AWS DataSync",
"AWS Logs URL": "https://logs.AwsRegion.amazonaws.com",
"AWS DataSync URL": "https://datasync.AwsRegion.amazonaws.com",
"AWS Region": "us-east-1",
"Authentication": "NoSecret",
"IAM Role": "arn:aws:iam::122343212345:role/Amazon12SSMRoleForInstancesQuickSetup",
"Connection Timeout": "30",
"Description": "",
"Centralized": true
}
}
The following table describes the AWS DataSync connection profile parameters.
Parameter |
Description |
---|---|
AWS Logs URL |
Defines the AWS Logs URL, based on the following format: https://logs.{{AwsRegion}}.amazonaws.com |
AWS DataSync URL |
Determines the authentication endpoint for AWS DataSync, based on the following format: https://datasync.{{AwsRegion}}.amazonaws.com |
AWS Region |
Determines the AWS region where the job is located. us-east-2 |
Authentication |
Determines one of the following authentication methods:
|
AWS Secret |
Defines the secret access key assigned to the account with the relevant permissions to the AWS service. You can use Secrets in Code to hide this value in the code. |
AWS Access Key |
Defines the access key assigned to the account with the relevant permissions to the AWS service. |
IAM Role |
Defines the Identity and Access Management (IAM) role name for the AWS service connection. |
Connection Timeout |
Determines the number of seconds to wait after Control-M initiates a connection request before a timeout occurs. Default: 30 |
Centralized |
Determines whether to create a centralized connection profile, which is stored in the Control-M/EM database and is available to all Agents. You must set this parameter to true. |
ConnectionProfile:Azure BackupLink copied to clipboard
Azure Backup enables you to back up and restore your data in the Microsoft Azure cloud.
For more information about this plug-in, see Control-M for Azure Backup.
The following examples show how to define a connection profile for an Azure Backup job:
-
This JSON defines an authentication using an Azure service principal:
CopyCopied to clipboard{
"ABK_CCP_SERVICE_PRINCIPAL":
{
"Type": "ConnectionProfile:Azure Backup",
"Subscription ID": "e76056e0-70de-4da8-b02e-61263a150b1j",
"Authentication Method": "service",
"Azure Management URL": "https://management.azure.com",
"Azure Login URL": "https://login.microsoftonline.com",
"Tenant ID": "92b796c5-5839-40a6-8dd9-c1fad320c68c",
"Client Secret": "*****",
"Application ID": "7f477fa3-1a1f-4877-ba80-f39bb563f1b8",
"Connection Timeout": "50",
"Description": "",
"Centralized": true
}
} -
This JSON defines an authentication using a managed identity.
CopyCopied to clipboard{
"ABK_CCP_MANAGED_IDENTITY ":
{
"Type": "ConnectionProfile:Azure Backup",
"Subscription ID": "e76056e0-70de-4da8-b02e-61263a150b1j",
"Authentication Method": "identity",
"Azure Management URL": "https://management.azure.com",
"Specify Managed Identity Client ID": "&client_id=",
"Managed Identity Client ID": "7f477fa3-1a1f-4877-ba80-f39bb563f1b8",
"Connection Timeout": "50",
"Description": "",
"Centralized": true
}
}
Managed Identity authentication is based on an Azure token that is valid, by default, for 24 hours. Token lifetime can be extended by Azure.
The following table describes the Azure Backup connection profile parameters.
Parameter |
Description |
---|---|
Subscription ID |
Defines the Azure account ID of your organization. You can retrieve the subscription ID from the Subscription menu in the Azure portal. |
Authentication Method |
Determines one of the following authentication methods:
|
Azure Management URL |
Defines the Azure service endpoint that enables you to perform API calls and retrieve the token for authentication. Default: https://management.azure.com |
Specify Managed Identity Client ID |
(Managed identity authentication) Determines whether the managed identity is specified by the Managed Identity Client ID parameter. This parameter must be included when you use the Managed Identity authentication method and there are multiple managed identities defined on your Azure VM. Valid Values:
|
Managed Identity Client ID |
(Managed identity authentication) Defines the client ID of the managed identity used for access. This parameter requires a value only if there are multiple managed identities defined on your Azure VM and you included the Specify Managed Identity Client ID parameter. If there is only one managed identity, it is detected automatically. |
Azure Login URL |
(Service Principal) Defines the base URL of the Microsoft Entra/Azure AD authentication endpoint. Default: https://login.microsoftonline.com |
Tenant ID |
(Service Principal) Defines the Azure tenant ID for your organization. |
Client Secret |
(Service Principal) Defines the password associated with the Service Principal/registered application. You can use Secrets in Code to hide this value in the code. |
Application ID |
(Service Principal) Defines the Registered App for the Azure service in your Microsoft Entra/Azure AD tenant. The corresponding Service Principal must be assigned the Owner or Contributor role for the Azure service. |
Connection Timeout |
Determines the number of seconds to wait after Control-M initiates a connection request before a timeout occurs. Default: 50 |
Centralized |
Determines whether to create a centralized connection profile, which is stored in the Control-M/EM database and is available to all Agents. You must set this parameter to true. |