Chat now with support
Chat with Support

Rapid Recovery 6.1.2 - Third-Party Integration Guide

Introduction to Rapid Recovery Add-on for Kaseya Introduction to Rapid Recovery and installing it using the Add-on for Kaseya Using the Rapid Recovery Add-on for Kaseya About us

Managing credentials for Rapid Recovery Core and Agent

A Rapid Recovery Core provides the essential services for backup, replication, archiving, and management. A protected machine is a machine on which the Rapid Recovery Agent software is installed that is managed and protected by a specific Core. Repositories are set up through the Core to store the snapshots that are captured from the protected machines. Repositories are configured by specifying a storage location associated with the Core server to store the data.

Managing Agent credentials

You must set credentials for all machines on which the Rapid Recovery Agent is installed for the Add-on for Kaseya to communicate with them. Complete the following steps to set the credentials for a Rapid Recovery protected machine.

Table 8. Agent credentials and information

Text Box

Description

Login

Enter the user name used to connect to this machine; for example, administrator.

Password

Enter the password associated with the login.

Domain

Enter the domain for this machine, if applicable. If the machine is not in a domain, leave this text box empty.

4.

Managing Core credentials

You must set credentials for all machines on which the Rapid Recovery Core is installed for the Add-on for Kaseya to communicate with them. Complete the following steps to set the credentials for a Rapid Recovery Core machine.

Table 9. Core credentials and information

Text Box

Description

Login

Enter the user name used to connect to this machine; for example, administrator.

Password

Enter the password associated with the login.

Domain

Enter the domain for this machine, if applicable. If the machine is not in a domain, leave this text box empty.

4.

Configuring repositories

A repository is used to store the snapshots that are captured from the protected servers. Before creating a repository, verify that you have set the credentials for logging on to the associated Rapid Recovery Core.

For more information about repositories, see the topic “Understanding Repositories” in the Rapid Recovery User Guide.

Related Documents