This guide provides an overview of your configuration options. In addition, this guide includes articles on how to manage users, storage, security, and more.
Browse the articles below for additional topics, tutorials, and reference guides, or search this guide using the search bar to the right. You can view all articles included in this guide by selecting Articles from the menu above.
- Adding Organizations For User Management
- A default organization is created when your Code42 environment is set up. This tutorial explains how to create additional organizations in your Code42 environment.
- Adding Storage
- This tutorial explains how to add storage in the following ways:
Add a new storage server to an existing destination
Add a store point
Add a provider as a destination
For full information on storage and data balancing, please see Destinations reference.
- Adding Users From The Administration Console
- There are three different ways to add users to your Code42 environment via the administration console. This article covers each option and provides step-by-step instructions for adding users by:
Entering information manually for each user
Uploading a text file with a list of users
Sending email invitations
For information about authenticating users with LDAP, please see Integrating With LDAP For User Authentication.
- Configuring Your Code42 Environment To Use RADIUS And LDAP Concurrently
- This tutorial explains how to configure your Code42 environment to support the use of RADIUS and LDAP together. Under this configuration, RADIUS is used for authentication, while LDAP handles other aspects of user management, such as user deactivation, role assignment, and organization assignment.
- Converting Your Code42 Environment From Local to Exclusively Cloud Destination
- This tutorial explains how to convert your Code42 environment from using exclusively local destinations (i.e., destinations using enterprise servers and store points in your own datacenter) to exclusively using cloud destinations provided by Code42 or a third party.
- Customizing Enterprise Email Templates
- Your Code42 environment sends email notifications for many types of events. By default, these emails follow standardized templates stored on your master server. You can create custom versions of these templates to customize the emails that your Code42 environment sends to your administrators and end users.
- Increasing Java Heap Space For Your Code42 Environment
- As the number of users and devices in your Code42 environment increases, the amount of Java Virtual Machine (JVM) heap space memory consumed on your enterprise server(s) will also increase. If your enterprise server runs out of heap space, it will be necessary to increase the maximum heap space setting. This tutorial explains how to increase the amount of memory allocated to your Code42 environment's JVM heap space.
- Installing Your Own SSL Certificate For HTTPS Console Access
- The enterprise server includes self-signed SSL certificates that can be used for secure access to the administration console. While this approach is secure, accessing these applications with a web browser can result in security warnings.
To eliminate browser security warnings when accessing the administration console via HTTPS, you can install a certificate signed by a recognized certificate authority (CA). This is very similar to the process of installing an SSL certificate for a standard web server.
The instructions in this article explain the details for obtaining and installing a CA-signed certificate into your enterprise server in several situations:
You have a private key and CA-signed certificate and your enterprise server runs on Mac, Linux or Solaris.
You have a private key and CA-signed certificate and your enterprise server run on Windows.
You do not have a private key or certificate.
- Offer Additional Destinations
- This article explains how to offer a destination to your organizations so that it can be used for redundant backup.
- Seeding To Your Own Private Cloud
- This tutorial explains how to expedite backing up a large amount of data through a process known as "seeding."
- Setting Up RADIUS For CrashPlan PROe Version 3.6
- RADIUS is a networking protocol that provides authentication, authorization and accounting. This tutorial explains how to configure your Code42 environment to authenticate with one or more RADIUS servers.
- Setting Up Single Sign-On With Okta
- This tutorial explains how to integrate your Code42 environment to work with the Okta identity management provider. Okta provides a standards-based service to enable centralized user access control using Single Sign-On (SSO) technologies such as SAML. Okta's cloud-based SSO service also supports integration with an existing directory service, such as Google Apps or Active Directory.
- Setting Up Single Sign-On With The Okta CrashPlan PROe App
- This tutorial explains how to integrate your Code42 environment to work with Okta, an identity management provider. Okta provides centralized user access control using Single Sign-On (SSO) technologies such as SAML and supports integration with an existing directory service, such as Google Apps or Active Directory.
This tutorial uses Okta's customized application for CrashPlan PROe, which simplifies the integration and setup process. For greater control over integrating your Code42 environment with Okta, please see our general Okta integration article.
- Setting Up The PROe Hybrid Cloud
- This tutorial explains how to configure the CrashPlan PROe Cloud Destination in a hybrid deployment and make it an available backup destination for users.
Follow these instructions using the network and provider key information you received from your PRO Services engineer.
- Single Sign On With Ping Identity
- This tutorial explains how to integrate your Code42 environment to work with Ping Identity (also known as Ping One). Ping Identity provides a standards-based service to enable centralized user access control using Single Sign-On (SSO) technologies such as SAML and OpenID. Ping Identity's cloud-based SSO service also supports the use of an identity bridge to link to an existing directory service, such as Google Apps or Active Directory.
- Using Backup Sets
- Backup sets are an option in CrashPlan PROe that can configure different groups of files to back up to different locations with different settings. For example, you can configure devices in your Code42 environment to back up frequently changed documents with a high priority each day, but also to back up relatively static system files with a lower priority only once a week.
- Customizing Your Administration Console
- You can customize the administration console by adding your own graphics and text. The information in this article outlines what specific elements can be customized and how to enable the customizations. Only the elements described in this article are customizable.
- Supported Metadata
- CrashPlan supports metadata on all platforms. Restored files will include supported metadata as described in this article.
CrashPlan PROe can be configured to support compliance with the Health Insurance Portability and Acc...
This tutorial explains how to enable basic user authentication via LDAP for CrashPlan PROe. Addition...
By default, CrashPlan backs up files in the user's home directory. This article explains several way...
Administrators can control how quickly source devices are allowed to send back up data to their dest...
Implementing single sign-on (SSO) with your Code42 environment provides security benefits and simpli...