beautypg.com

17 systems insight manager custom tools, 18 understanding systems insight manager security – HP Systems Insight Manager User Manual

Page 5

background image

Managing with tasks........................................................................................................................57
Viewing results................................................................................................................................58
Example - Device ping......................................................................................................................58

IV Systems Insight Manager advanced features................................................59

16 Collections in Systems Insight Manager

..................................................60

Collections in Systems Insight Manager...............................................................................................60

Types of collections.....................................................................................................................61
Other customization features........................................................................................................62

17 Systems Insight Manager custom tools

....................................................66

General concepts............................................................................................................................66

Tool types..................................................................................................................................66
Environment variables for custom tools...........................................................................................67
Custom tool menu placement........................................................................................................68
Custom tool URL format...............................................................................................................69

Creating custom tools through the GUI................................................................................................69

New.........................................................................................................................................70
Edit...........................................................................................................................................70
View tool definition.....................................................................................................................70
Run Now/Schedule....................................................................................................................70
Delete.......................................................................................................................................70

Creating custom tools through the Systems Insight Manager CLI.............................................................70

Creating a custom SSA tool..........................................................................................................70
Example Web launch tool............................................................................................................73
Example MSA tool......................................................................................................................73
Example Enabling Remote Desktop tool.........................................................................................74
Adding a TDEF to Systems Insight Manager...................................................................................75
Removing a TDEF from Systems Insight Manager.............................................................................75
Modifying a TDEF.......................................................................................................................76

18 Understanding Systems Insight Manager security

.....................................77

Securing communication...................................................................................................................77

Secure Sockets Layer (SSL)...........................................................................................................77
Secure Shell (SSH)......................................................................................................................77
Hyper Text Transfer Protocol Secure (HTTPS)...................................................................................77
Secure Task Execution (STE) and Single Sign-On (SSO)....................................................................77
Distributed Task Facility (DTF).......................................................................................................77
WBEM......................................................................................................................................78
LDAP.........................................................................................................................................78
RMI..........................................................................................................................................78

Credentials management..................................................................................................................78

SSL certificates...........................................................................................................................78
Certificate sharing......................................................................................................................78
SSH keys...................................................................................................................................78
Passwords..................................................................................................................................78

Browser..........................................................................................................................................79

SSL...........................................................................................................................................79
Cookies.....................................................................................................................................79
Passwords..................................................................................................................................79
Password warnings.....................................................................................................................79
Browser session..........................................................................................................................79
Internet Explorer zones................................................................................................................80
System link format.......................................................................................................................80

Operating-system dependencies.........................................................................................................80

User accounts and authentication.................................................................................................80
File system.................................................................................................................................80
Background processes.................................................................................................................81
Windows Cygwin.......................................................................................................................81
HP-UX and Linux.........................................................................................................................81

Table of Contents

5