HP Systems Insight Manager 7.2 Technical Reference Guide

Related topics..................................................................................................................230
System credentials................................................................................................................230
Columns in the "Credentials that are in use" table................................................................231
Viewing, editing, and deleting system credentials.................................................................231
Sign-in credentials............................................................................................................233
Single sign on credentials.................................................................................................234
SNMP credentials............................................................................................................234
SNMPv3 credentials.........................................................................................................235
SSH credentials...............................................................................................................236
WBEM credentials...........................................................................................................237
WS-Man credentials.........................................................................................................238
VME credentials..............................................................................................................238
Related information..........................................................................................................239
Security...............................................................................................................................240
Creating a server certificate..............................................................................................240
Editing a server certificate.................................................................................................242
Importing a server certificate.............................................................................................243
Exporting a server certificate.............................................................................................243
Creating a certificate signing request..................................................................................244
Submitting a certificate signing request...............................................................................244
Importing a CA-signed certificate.......................................................................................244
Synchronizing certificates..................................................................................................245
Configuring the system link................................................................................................245
Configuring sign-in events.................................................................................................246
Privilege elevation............................................................................................................246
Changing the authentication mechanism.............................................................................247
Configuring Two Factor Authentication................................................................................247
Certificate Revocation Check Configuration.........................................................................247
Security related information...............................................................................................248
Trusted certificates................................................................................................................248
Importing trusted certificates..............................................................................................249
Exporting trusted certificates..............................................................................................249
Deleting trusted certificates................................................................................................250
Requiring trusted certificates..............................................................................................251
Configuring SSH key security.............................................................................................251
Importing an SSH key.......................................................................................................252
Exporting an SSH key.......................................................................................................252
Deleting an SSH key........................................................................................................253
Related information..........................................................................................................253
Viewing the audit log............................................................................................................253
Log content.....................................................................................................................253
Configuring the audit log.......................................................................................................254
Configuring the audit log..................................................................................................254
Monitoring systems and events...............................................................................................255
Creating system and cluster collections................................................................................255
Command line interface...............................................................................................257
Editing system and cluster collections..................................................................................257
Command line interface...............................................................................................259
Moving system and cluster collections.................................................................................259
Command line interface...............................................................................................259
Copying system and cluster collections................................................................................260
Command line interface...............................................................................................260
Deleting system and cluster collections................................................................................260
Command line interface...............................................................................................261
Setting properties for system and cluster collections...............................................................261
Contents 11