Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Storage » Understanding User Roles & Access Control in Object First OOTBI

Understanding User Roles & Access Control in Object First OOTBI

Posted on 11/11/202527/11/2025 Christian By Christian No Comments on Understanding User Roles & Access Control in Object First OOTBI
Object First OOTBI - Best Storage Repo for Veeam

Object First OOTBI (Out-of-the-Box Immutability) is a purpose-built, secure, and immutable backup storage solution engineered specifically for Veeam Backup & Replication. This guide discusses the “Understanding User Roles & Access Control in Object First OOTBI”. Please, see How to Configure Object First OOTBI Appliance, how to update Object First OOTBI Cluster, and Object First OOTBI Appliance Unboxing and Quick Setup.

Table of contents

  • Role-Based Access Control (RBAC) in Object First OOTBI
    • OOTBI User Roles
    • How to create a User on OOTBI
  • Conclusion

Object First “OOTBI” was designed by the founder of Veeam, and it eliminates the complexity associated with traditional backup storage by offering an appliance that you can deploy, configure, and integrate with Veeam in minutes. Its architecture prioritizes immutability, ensuring that backup data remains tamper-proof, ransomware-resistant, and always recoverable.

OOTBI leverages object storage technology optimized for Veeam. This enables organizations to store backups directly and securely without managing additional infrastructure layers. By combining storage performance, immutability, and simplicity. OOTBI helps IT teams achieve reliable data protection while reducing operational overhead.

Also, see how to perform Offline and Online Update for Object First Out-of-the-Box Cluster, how to integrate ObjectFirst OOTBI Appliance with VBR. Here is how to create a backup job for Proxmox VMs using VBR.

Role-Based Access Control (RBAC) in Object First OOTBI

However, security in a backup environment goes beyond just immutable storage. It also depends on who has access and what they can do within the system. This is where user roles and permissions play a critical role.

Implementing Role-Based Access Control (RBAC) in Object First OOTBI allows administrators to assign specific privileges to users based on their job responsibilities.

By doing so, organizations can enforce the principle of least privilege, ensuring that each user only performs actions necessary for their role. For example, a system administrator may require OOTBI Cluster access, while an auditor only needs read-only visibility.

This granular control minimizes the risk of accidental or malicious changes, safeguards critical backup data. This further supports compliance with standards such as GDPR, ISO 27001, and NIST. It also simplifies auditing and accountability by clearly defining who can access or modify sensitive configurations.

Please, see how to Migrate Windows Servers from Hyper V to Proxmox Correctly, and how to Restore VM to Original location using Veeam Entire VM restore.

OOTBI User Roles

When you create a new user in OOTBI, the setup wizard prompts you to assign a role that defines their level of access. The image below table discusses the roles and use-cases. In essence, OOTBI not only protects your backups from external threats but also fortifies them internally through intelligent access management.

By properly assigning user roles, you strengthen the overall security posture of your backup storage infrastructure and maintain confidence that your data remains both secure and compliant.

RoleDescriptionBest Use Case
AdministratorFull access to the OOTBI clusterFor system admins managing configuration and upgrades
Hardware OperatorAdmin without access to S3/IAMFor operators handling hardware but not data policies
Read-onlyView-only access to the Web ConsoleFor auditors or compliance officers
Power REST ManagerManage nodes and power operations via APIFor automation or DevOps engineers
Bucket ManagerManage S3 buckets onlyFor storage admins managing backup repositories

Please, see MFA on Root Account: Create a User on AWS and Register MFA, Deep Dive into Protecting AWS EC2, RDS Instances and VPC, and Creating IAM Users, Adding MFA and Policies on AWS.

How to create a User on OOTBI

To do this, from the Object First OOTBI dashboard, click on Users. In this window, click on create user as shown below. Enter the name, password etc., and click Next.

create use on OOTBI

Select the appropriate user role. See how to Migrate Microsoft Enterprise Root Certification Authority and Forest Domain Domain on Azure

user role

In my case, I will select Read-Only user role and click on Next to continue.

The Read-only role allows users to log into the Web Console with view-only access. They can monitor system status, storage usage, and configuration details but cannot modify or delete any settings. This role is ideal for auditors, compliance officers, or managers who need visibility into the system for reporting or verification purposes. By limiting their access to viewing only, you ensure transparency without compromising operational control.

read only

On the summary window, click on create as shown below.

Create user

You will be prompted to enter your password to confirm action.

Admin Password

If you have Multi-Factor authentication enabled, you will be prompted to enter the 2FA code as shown below. For more information on this, see ‘OOTBI Security Best Practices: Enable Honeypot on Object First“.

2FA

As you can see, we have successfully created a new user with the role “read-only” o access the OOTBI cluster.

user account created

Conclusion

By assigning distinct roles, you enforce separation of duties. A core security principle that prevents any single user from having unchecked control. This structure not only reduces the chance of human error or malicious actions. But also strengthens compliance alignment with enterprise governance frameworks like COBIT, ISO 27001, and NIST etc.

Furthermore, role-based access helps streamline daily operations. Administrators can focus on core infrastructure management, while auditors and operators perform their tasks without overlapping responsibilities. The result is a more secure, efficient, and accountable backup environment.

I hope you found this article on “Understanding User Roles & Access Control in Object First OOTBI” very useful. Please, feel free to leave a comment below.

5/5 - (1 vote)

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
Backup, Storage Tags:Object Identity and User Management, Role-Based Access Control (RBAC) in Object First OOTBI

Post navigation

Previous Post: How to create a backup job for Proxmox VMs using VBR
Next Post: Unveiling OOTBI Mini and New Features for v1.7 from Object First

Related Posts

  • Azure Backup Copy 1
    How to Delete Backup Job in Recovery Services Vault AWS/Azure/OpenShift
  • v13 harding   Veeam
    Hardening Your Infrastructure: A Guide to VMware VBS and MS GPO Credential Guard in VBR v13 Backup
  • Synology NFS Share
    Add Synology NFS Storage to Proxmox VE for VMs and Backups Storage
  • untitled 5 1
    Migrate Veeam MSSQL Database to a new Microsoft SQL Server Backup
  • sep hybrid backup tiny
    SEP sesam Hybrid Backup and Disaster Recovery Solution Backup
  • veeaamAgent1
    Veeam Agent Vulnerability: Fix Veeam Agent vulnerability for Microsoft Windows  Backup

More Related Articles

Azure Backup Copy 1 How to Delete Backup Job in Recovery Services Vault AWS/Azure/OpenShift
v13 harding   Veeam Hardening Your Infrastructure: A Guide to VMware VBS and MS GPO Credential Guard in VBR v13 Backup
Synology NFS Share Add Synology NFS Storage to Proxmox VE for VMs and Backups Storage
untitled 5 1 Migrate Veeam MSSQL Database to a new Microsoft SQL Server Backup
sep hybrid backup tiny SEP sesam Hybrid Backup and Disaster Recovery Solution Backup
veeaamAgent1 Veeam Agent Vulnerability: Fix Veeam Agent vulnerability for Microsoft Windows  Backup

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

Veeam Vanguard

  • gfhj
    Debugging: How to debug a PowerShell script Windows
  • Synology Cloud Sync
    How to Sync Data in Cloud Drives to Synology NAS Backup
  • s3
    How to Copy from a server to s3 and vice versa AWS/Azure/OpenShift
  • Cross Domain Folders Access
    Cross Domain Folders Access: Reference account is Locked out Windows
  • AADSTS900144
    Fix AADSTS900144: The request body must contain the parameter Linux
  • image 75
    Useful Tutorial on CBackup Software Network | Monitoring
  • Emulate Cisco Router with GNS3
    How to make a router function as a switch in GNS3 Network | Monitoring
  • Featured image 2
    Enable Microsoft Defender SmartScreen: How to prevent Exe files from getting deleted randomly in Windows 10 and 11 Security | Vulnerability Scans and Assessment

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,808 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.