HP System Management Homepage
Related Topic
▲ The Settings Page
Trusted Management Servers
Certificates
establish the trust relationship between HP SIM or Insight Manager 7 and HP SMH. The Trusted
Management Servers link enables you to manage your
certificates
in the Trusted Certificates List. Note the
following:
• Import Certificate Data Certificates establish the trust relationship between HP SIM and HP SMH.
• Add Certificate From Server You can add a trusted certificate from an HP SIM server.
To import a certificate to the trusted certificates list:
1. Select Settings from the menu.
2. In the System Management Homepage box, click the Security link.
3. Click the Trusted Management Servers link.
4. In the Add Certificate area, click the Import Certificate Data radio button.
5. Copy and paste the Base64-encoded certificate into the textbox.
6. Click Import.
To add a certificate from a server:
1. Select Settings from the menu.
2. In the System Management Homepage box, click the Security link.
3. Click the Trusted Management Servers link.
4. In the Add Certificate From Server area, click the Add Certificate From Server radio button.
5. In the Server Name textbox, enter the IP address or server name of the HP SIM server.
6. Click Add.
Related Procedures
• Anonymous/Local Access
• IP Binding
• IP Restricted Login
• Local Server Certificate
• Alternative Names Certificates
• Port 2301
• Timeouts
• Trust Mode
• Kerberos Authorization Procedure
• User Groups
Related Topic
▲ The Settings Page
Kerberos Authorization Procedure
When a user wants to authenticate to a service in a Kerberos realm, a series of steps must be taken to
perform the authentication. The client (the user’s machine) must obtain credentials from the Kerberos servers,
which are the
Authentication Server (AS)
and the
Ticket Granting Server (TGS)
.
The AS and the TGS reside on the same machine and are referred to as the
Key Distribution Center (KDC)
.
The following outlines the process when a user accesses secure services in a Kerberos realm.
The process only occurs when the user initially logs in to a Kerberos realm and tries to perform the first access
to a Kerberos-secured service.
Security 41