HP Systems Insight Manager 7.2 Technical Reference Guide
a. Select the Authentication Protocol from the dropdown list.
b. Enter and confirm the Authentication Passphrase.
c. Select the Privacy Protocol from the dropdown list.
d. Enter and confirm the Privacy Passphrase.
6. Select Keep the in-use protocol credentials even if the protocol fails to respond during discovery.
7. Click OK to save settings, or click Cancel to disregard changes.
Related information
SSH credentials
The SSH tab enables you to configure SSH access. It is required that Configure or Repair Agents
run after a credential is configured using host-based or user-based authentication. Host-based
authentication refers to the SSH key of the host that is trusted by the target system. User-based
authentication refers to the SSH key of the user that is trusted by the target system. In the list of
individual systems, if either the host-based or user-based authentication is selected, the user name
and password boxes are disabled. By default the specified user option appears first.
Procedure 87 Configuring SSH credentials
1. Click Show advanced protocol credentials.
2. Select the SSH tab.
3. To configure SSH access authentication, select Configure Secure Shell (SSH) access
authentication. Select from:
• Select Configure SSH for each selected system as follows, and then select from:
Host-based key authentication
Requires additional credentials so that Configure or Repair Agents can be run on
the target systems.
a.
b. User-based key authentication
Requires additional credentials so that Configure or Repair Agents can be run on
the systems.
Configures the managed systems to allow access to the specific user whose credentials
are provided.
c. Password authentication
Enter the user name and password to connect to managed systems.
• Select Configure SSH for the selected systems individually as follows to configure each
selected systems individually.
a. Host-based
Requires additional credentials so that Configure or Repair Agents can be run on
the target systems.
b. User-based
Requires additional credentials so that Configure or Repair Agents can be run on
the target systems. Configures the managed systems to allow access to the specific
users whose credentials are provided.
c. Password
Enter the user name and password.
4. (Optional) If you selected Configure Secure Shell (SSH) access authentication User-based or
Host-based key authentication, the Additional credentials required to save the configurations
for WBEM, SSH, and/or Single Sign-On Section appears. Select from:
236 Operations