Code42 console differences in the Code42 cloud (CrashPlan)
Who is this article for?
Instructor, no.
Incydr Professional, Enterprise, Gov F2, and Horizon, no.
Incydr Basic, Advanced, and Gov F1, no.
CrashPlan Cloud, yes.
Retired product plans, yes.
CrashPlan for Small Business, no.
Overview
After upgrading from an on-premises authority server to the Code42 cloud, you'll notice some changes in the Code42 console. This article describes the differences in the Code42 console between the two deployment models.
How to access the Code42 console
To access the Code42 console, use a supported web browser to visit one of the following URLs:
Your credentials only work at one of these URLs. If you don't know the URL for your Code42 environment, contact our Customer Champions for support.
Upgrades and maintenance
Upgrades and maintenance for your Code42 console and Code42 apps happen automatically during the scheduled maintenance and release windows. You can manage Code42 app updates in Administration > Client Management > Updates. For more helpful resources about releases and maintenance to the Code42 cloud, see:
- Code42 Announcements page for news on releases
- Code42 Status page for news on unscheduled maintenance and Code42 system health
Settings
Many of the configuration options and settings that appeared under Administration > Settings in your on-premises authority server no longer apply in your Code42 cloud environment. However, you can still configure Device Backup Default Settings like backup exclusions, file selections, and frequency and version settings, in organization settings.
To view and update Device Backup Default Settings in your Code42 console:
- Go to Administration > Environment > Organizations.
- Select an organization.
- Click the action menu.
- Choose Device Backup Defaults.
These settings apply to that organization as well as any organization inheriting settings from it.
Identity management
Improved identity management screens in the Code42 console make it easy to connect and manage authentication and authorization for Code42. Go to Administration > Integrations > Identity Management to:
- Add new authentication providers for single sign-on
- Configure provisioning: In the Code42 cloud, you now use the Code42 User Directory Sync to provision users. This feature automatically adds, creates, updates, and deactivates users in Code42 based on changes made within your directory service.
- View logs specific to authentication and authorization
Using RADIUS for user authentication is not supported in Code42 cloud environments.
More administration tools
The Code42 console contains more tools for managing your Code42 environment under Administration. You must have certain product plans to see all the available menu options. Contact your Customer Success Manager (CSM) for assistance with product plans.
Support Access
Use Support Access to give Customer Champions permission to access your environment to assist in troubleshooting.
Keystore
Archive Keystore enables you to store copies of users' encryption keys in your own keystore.
Audit Log
View the Audit Log for a record of who did what and when in your Code42 environment.
Troubleshooting environment issues
Code42 app
To access Code42 app logs in Code42 cloud environments, follow the instructions at Retrieve device logs from the Code42 console (CrashPlan).
Code42 console
In the past, you may have accessed the history.log or com_backup42_app.log server logs for troubleshooting environment issues like:
- Code42 console configuration changes and the user that made them
- User, organization, and device creation
- Errors
In Code42 cloud environments, contact our Customer Champions for support to get this information.
Update documentation links
Documentation for the Code42 cloud is located in the CrashPlan administration section of the support site. Update any bookmarked links.
Other changes
- All usernames in Code42 cloud environments must be emails.
- A limited number of commands are available to run from the Code42 console.
- Custom user roles are not available. Instead, use predefined user roles.