Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
This playbook creates a shared Key Vault for NetApp Ransomware Resilience credentials and provides authentication services to all NetApp Ransomware Resilience playbooks in the solution.
| Attribute | Value |
|---|---|
| Type | Playbook |
| Solution | NetApp Ransomware Resilience |
| Source | View on GitHub |
📄 Source: NetApp-RansomwareResilience-Auth-Playbook/readme.md
This playbook provides authentication services for all NetApp Ransomware Resilience playbooks. It creates and manages a shared Azure Key Vault that securely stores your NetApp API credentials and handles OAuth2 token generation.
The Auth Playbook serves as the central authentication hub for the NetApp Ransomware Resilience solution. All other playbooks depend on this playbook to obtain valid authentication tokens when communicating with the NetApp Ransomware Resilience API.
This playbook MUST be deployed FIRST before deploying any other NetApp Ransomware Resilience playbooks.
Before deploying this playbook, you need: 1. Valid NetApp Ransomware Resilience API credentials: - Client ID - Client Secret - Account ID 2. Appropriate permissions to create resources in your Azure subscription
After deploying this playbook: 1. Verify that the Key Vault was created successfully 2. Confirm that your credentials are stored correctly in the Key Vault 3. Test the Logic App to ensure it can retrieve authentication tokens 4. Grant access permissions to the Key Vault for other playbooks as needed
If you encounter authentication issues, verify: - Your NetApp API credentials are valid and active - The Key Vault is accessible and contains all required secrets - The Logic App has appropriate permissions to access the Key Vault
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊