The Backup Node Password¶
Initially, when a backup node is created and activated in Cloutility, a randomly generated password is set and will thereafter be made available from the portal under "Setup information."
When you log in with the backup-archive client for the first time using the initial password, it will be stored encrypted on the client system. On future logins, the stored password will be used automatically without you needing to enter it again.
A backup node password has an expiration time of 30 days. If the backup-archive client attempts to log in while the password is expired, it will regenerate a new random password and send it to the server. This happens automatically. Keep in mind that when it happens, the initial password found in Cloutility becomes obsolete.
The above-mentioned automatic authentication and password generation is enabled by using the client option PASSWORDACCESS GENERATE
.
It should be set already if you were using the template provided by Safespring for UNIX-based systems or Windows to configure the client.
If not, you can enable this feature by adding the option to /opt/tivoli/tsm/client/ba/bin/dsm.sys
or C:\Program Files\Tivoli\TSM\Baclient\dsm.opt
on UNIX-based systems or Windows respectively.
Further reading¶
The passwordaccess
option: https://www.ibm.com/docs/en/storage-protect/8.1.22?topic=reference-passwordaccess
Retrieving the current password¶
Within the first 30 days upon creating a backup node or changing a node's password from Cloutility, the "Setup information" section in Cloutility should be a reliable way to retrieve the current password.
However, if the password has been changed outside Cloutility for different reasons, such as password expiration, the password found in Cloutility is going to be obsolete.
Note
Normally, if you need access to the node password, for example, for data recovery, it is more convenient to just change the password in Cloutility rather than retrieving the current one. In case you still want the current password, read on!
The most reliable way of retrieving the current password is to read it from the encrypted store on the client system.
Retrieving the encrypted password on Linux¶
On Linux, the password is stored encrypted in /etc/adsm/TSM.KDB
. Start by listing the entries in the database:
gsk8capicmd_64 -cert -list -db /etc/adsm/TSM.KDB -stashed
The output should be something like:
Certificates found * default, - personal, ! trusted, # secret key # 1708990603_0 # 1708184881_0
Pick the first (latest) one, and run the following to retrieve the password in plain-text:
gsk8capicmd_64 -secretkey -extract -db /etc/adsm/TSM.KDB -label 1708990603_0 -target /root/1708990603_0 -stashed grep -v "SECRET KEY" /root/1708990603_0 | base64 -d
Clean up:
rm /root/1708990603_0
Retrieving the encrypted password on Windows¶
On Windows, the encrypted password is stored in C:\ProgramData\Tivoli\TSM\baclient\Nodes\[your node name]\DCO1-BACKUP-SERVER-2\TSM.KDB
.
Replace [your node name]
with the name of your backup node. The name "DCO1-BACKUP-SERVER-2" above is the name of Safespring's backup server. If you are using the older TSM12 server, the name in the path should reflect that.
Open the Command Line Prompt in Administrative Mode, and enter:
cd "C:\Program Files\ibm\gsk8\lib64" "C:\Program Files\ibm\gsk8\bin\gsk8capicmd_64.exe" -cert -list -db "C:\ProgramData\Tivoli\TSM\baclient\Nodes\[your node name]\DCO1-BACKUP-SERVER-2\TSM.KDB" -stashed
Again, replace [your node name]
with your backup node name.
The output should be something like:
Certificates found * default, - personal, ! trusted, # secret key # 1710702970_0
Pick the first (latest) one, and run the following to retrieve the password in plain-text:
"C:\Program Files\ibm\gsk8\bin\gsk8capicmd_64.exe" -secretkey -extract -db "C:\ProgramData\Tivoli\TSM\baclient\Nodes\[your node name]\DCO1-BACKUP-SERVER-2\TSM.KDB" -label 1710702970_0 -target "C:\Windows\Temp\1710702970_0" -stashed certutil -decode -f "C:\Windows\Temp\1710702970_0" "C:\Windows\Temp\1710702970_0.plain" type "C:\Windows\Temp\1710702970_0.plain"
Clean up:
del "C:\Windows\Temp\1710702970_0" "C:\Windows\Temp\1710702970_0.plain"
Further reading¶
Password storage: https://www.ibm.com/docs/en/storage-protect/8.1.22?topic=started-secure-password-storage
Password encryption details: https://blog.sigterm.se/posts/the-joys-of-bootstrapping-ibm-backup-client/
Changing the password¶
You can whenever you want to change the password of a backup node from Cloutility. This will enforce the new password and update it on the backup server. To do so, go to Consumption Units -> [Your backup node] -> Basics. Click on "Change" on the right side of "SP password".
It is also possible to change the password directly from the backup-archive client. Keep in mind that this will make the password stored in Cloutility out of sync with the actual password. This is a technical limitation due to the backup server only storing the hash digest of the password for security reasons. You will be the only one who can access the password in plain-text.
On Linux¶
Enter the following command:
sudo dsmc set password 'old password' 'new password'
On Windows - GUI¶
Open the application "Backup-Archive GUI." Go to Utilities -> Change Password...
On Windows - command line¶
Open the Command Line Prompt in Administrative Mode, and enter:
cd "C:\Program Files\Tivoli\TSM\baclient" dsmc set password "old password" "new password"
Further reading¶
More about dsmc set password
: https://www.ibm.com/docs/en/storage-protect/8.1.22?topic=commands-set-password
Session security: transitional vs. strict¶
When a backup node is newly created and activated, it starts off with something called transitional session security. Once a client has logged in to the node for the first time, the session security is normally automatically changed to the strict state.
This table highlights important differences between the two:
Transitional | Strict |
---|---|
Laxer security requirements overall | Stricter security requirements overall |
Case insensitive passwords | Case sensitive passwords |
Max 1 invalid sign-on attempt before locking the node | Max 5 invalid sing-on attempts before locking the node |
Invalid sign-on attempts¶
The limit for the number of consecutive invalid sign-on attempts is 5 for backup nodes with strict session security, and 1 for backup nodes with transitional session security. When the limit is reached, the backup node will be locked and will not be accessible unless it is unlocked again. You can unlock the backup node from Cloutility.
Note
If you have just been locked out from the backup node, Cloutility will still claim that the node is "unlocked" for a short while. This is because Cloutility syncs the lock-state with the backup server every hour, and may have not had time to sync yet. You can bypass this issue by "locking" the backup node and unlocking it again. The node should end up unlocked immediately after.
This may be initially confusing because the backup-archive client will not tell you that you have been locked out.
We will go through a few scenarios which may be relevant if you experience authentication failures.
Scenario #1—Correct password but authentication still fails?¶
You have just created and activated a new backup node. Because it is new, it is set to transitional session security. This means that you have only one login attempt before getting locked out.
Problem¶
You accidentally type the wrong password, and the server silently locks the node. Then you type in the password (correctly this time) and still end up with an authentication failure. The backup-archive client made no mention of the node being locked, and only reported authentication failures regardless of what you typed. Cloutility has not synced the lock-state with the backup server yet, and therefore does not show that the node is locked.
Solution¶
Go to Cloutility -> Consumption Units -> [Your backup node] -> Basics.
If Cloutility hasn't synced the lock-state yet, the backup node will appear as "Unlocked." If so, click on "Unlocked" to change the state to "Locked," and hit Save.
Click on "Locked" to change the state back to "Unlocked" and hit save.
The node should now be unlocked. Try to log in again.
Scenario #2—Correct password but the node still gets locked¶
Your client system runs Linux, and you are migrating your backups from an old node to a new one.
After having created and activated the new backup node on Cloutility, you attempted to log in to the new node using the correct password, but still ended up with an authentication failure. Because it is a new node, it was set to transitional session security. That meant you only had one login attempt before getting locked out. The solution in Scenario #1 did not help.
Problem¶
The backup-archive client is trying old credentials from /etc/adsm/TSM.KDB
before giving you a chance to type the correct password. This causes the new backup node to instantly lock up.
Solution¶
Remove the old password store:
rm -f /etc/adsm/TSM.*
Scenario #3—"ANS5283E The operation was unsuccessful"¶
Your client system runs Windows, and you are migrating your backups from an old node to a new one.
After having created and activated the new backup node on Cloutility, you attempted to log in to the new node using the correct password.
Problem¶
Instead of successfully establishing a session with the backup server, you ended up with the following error in
C:\Program Files\Tivoli\TSM\baclient\dsmerror.log
:
ANS5283E The operation was unsuccessful
Solution¶
This error appears when you have forgotten to import Safespring's CA certificate. The problem is not the password being wrong. Please consult the Windows installation guide for information on how to import the certificate.
You can verify that the CA certificate has been imported successfully by running the following commands in the Command Prompt with Administrative privileges:
cd "C:\Program Files\ibm\gsk8\lib64" "C:\Program Files\ibm\gsk8\bin\gsk8capicmd_64.exe" -cert -list -db "C:\Program Files\Tivoli\TSM\baclient\dsmcert.kdb" -stashed
You should be getting the following output:
Certificates found * default, - personal, ! trusted, # secret key ! "Safedc Net Root CA"