Owner's Manual
Security 91
Equipment
The Equipment page provides an interface through which you can associate managed resources
with the authentication object you are creating or editing.
-
To add equipment
—Click
Add
. The Select
Equipment
page appears.
Click an equipment object in the list to select it; the selected object then appears in the lower
pane. A turn key icon appears if the selected object contains subcomponents (cards and ports,
for example); click on the turn key to display a tree representation of those subcomponents.
Click on any individual item in the tree to select it; click
OK
to add the selected resource to
the list associated with the authentication object.
-
To Delete Equipment
— Select the equipment object in the list and click
Delete
.
CAUTION:
If you add an authentication to a device in Resource Editor, Authentication Manager / Editor appears as a
selector / new authentication creation screen. If you create a new authentication object, do not also add
the device to the Equipment panel of Authentication Editor.
User Groups
This page lets you associate User Groups with authentication objects. The created authentication
object is visible only to users who are members of the associated group. The initial display (Figure
4-17 is an example) lists the groups associated with this object.
Figure 4-17. User Groups Page
To add a group, click
Add
. To remove a group from the list, select it and click
Delete
. When adding
groups, the Group Manager dialog, appears. (For more information on the Group Manager, see
User Group Manager on page 77.)
Select a group from the displayed list (or click
New...
to define a new group) and click OK to
implement your selection.
SSH Strict Host Key Checking
The following describes how to setup SSH strict host key checking and how to populate the
known_hosts
file.
The following sections describe: