17 systems insight manager custom tools, 18 understanding systems insight manager security – HP Systems Insight Manager User Manual
Page 5
![background image](/manuals/396914/5/background.png)
Managing with tasks........................................................................................................................57
Viewing results................................................................................................................................58
Example - Device ping......................................................................................................................58
IV Systems Insight Manager advanced features................................................59
16 Collections in Systems Insight Manager
..................................................60
Types of collections.....................................................................................................................61
Other customization features........................................................................................................62
17 Systems Insight Manager custom tools
....................................................66
Tool types..................................................................................................................................66
Environment variables for custom tools...........................................................................................67
Custom tool menu placement........................................................................................................68
Custom tool URL format...............................................................................................................69
Creating a custom SSA tool..........................................................................................................70
Example Web launch tool............................................................................................................73
Example MSA tool......................................................................................................................73
Example Enabling Remote Desktop tool.........................................................................................74
Adding a TDEF to Systems Insight Manager...................................................................................75
Removing a TDEF from Systems Insight Manager.............................................................................75
Modifying a TDEF.......................................................................................................................76
18 Understanding Systems Insight Manager security
.....................................77
Secure Sockets Layer (SSL)...........................................................................................................77
Secure Shell (SSH)......................................................................................................................77
Hyper Text Transfer Protocol Secure (HTTPS)...................................................................................77
Secure Task Execution (STE) and Single Sign-On (SSO)....................................................................77
Distributed Task Facility (DTF).......................................................................................................77
WBEM......................................................................................................................................78
LDAP.........................................................................................................................................78
RMI..........................................................................................................................................78
SSL...........................................................................................................................................79
Cookies.....................................................................................................................................79
Passwords..................................................................................................................................79
Password warnings.....................................................................................................................79
Browser session..........................................................................................................................79
Internet Explorer zones................................................................................................................80
System link format.......................................................................................................................80
User accounts and authentication.................................................................................................80
File system.................................................................................................................................80
Background processes.................................................................................................................81
Windows Cygwin.......................................................................................................................81
HP-UX and Linux.........................................................................................................................81
Table of Contents
5