HP XP P9000 Command View Advanced Edition Suite Software 7.6.1-00 Administrator Guide
About the hierarchical structure model .......................................................................... 124
About the flat model ................................................................................................... 124
About the BaseDN ..................................................................................................... 125
Registering an external authentication server and an external authorization server .................... 126
Setup items in the exauth.properties file for LDAP authentication ....................................... 127
Examples of setting the exauth.properties file for LDAP authentication ............................... 133
Setup items in the exauth.properties file for RADIUS authentication ................................... 135
Examples of setting the exauth.properties file for RADIUS authentication ............................ 141
Setup items in the exauth.properties file for Kerberos authentication .................................. 142
Examples of setting the exauth.properties file for Kerberos authentication ........................... 148
About a LDAP search user account ..................................................................................... 149
Conditions for LDAP search user account ...................................................................... 150
Registering an LDAP search user account ...................................................................... 151
Deleting an LDAP search user account .......................................................................... 152
Checking the LDAP directory server that registered LDAP search user account .................... 153
Registering a shared secret ................................................................................................ 153
Deleting a shared secret ............................................................................................. 153
Checking the RADIUS server that registered a shared secret on the management server ...... 154
Checking connections to an external authentication server and an external authorization
server ............................................................................................................................. 154
Notes on commands for setting up a link to an external authentication server ........................... 156
Encryption types for Kerberos authentication ........................................................................ 157
4 Security ........................................................................................ 159
Login warning banners ............................................................................................................ 159
Conditions that apply when displaying warning banner messages .......................................... 159
Creating and registering a message displayed on a warning banner ...................................... 159
Deleting a message from the warning banner ...................................................................... 161
Communication security mode .................................................................................................. 162
Secure communication for Device Manager and Tiered Storage Manager ............................... 162
Operation workflow for secure communication between a management server and a
management client (GUI) ............................................................................................ 165
Operation workflow for secure communication between a management server and a
management client (Device Manager CLI) ..................................................................... 167
Operation workflow for secure communication between a management server and a
management client (Tiered Storage Manager CLI) .......................................................... 168
Operation workflow for secure communication between an LDAP directory server and a
management server .................................................................................................. 169
Operation workflow for secure communication between a Device Manager server and
Replication Manager server ........................................................................................ 169
Operation workflow for secure communication between a Host Data Collector machine and
a management server ................................................................................................. 171
Operation workflow for secure communication between a virtualization server and Host Data
Collector .................................................................................................................. 172
Operation workflow for secure communication between a virtualization server and a
management server ................................................................................................... 172
Operation workflow for secure communication between a storage system and a management
server ...................................................................................................................... 173
Operation workflow for secure communication between an SMI-S provider and a management
server ....................................................................................................................... 173
Operation workflow for secure communication between a storage system and a management
client (GUI) ............................................................................................................... 174
Operation workflow for secure communication between a management server and a CIM
client (object operations) ............................................................................................. 175
Administrator Guide 7