beautypg.com

Performing optional configuration, Authentication – HP Remote Device Access Software User Manual

Page 36

background image

Access Control

Description

User

The name of the user for which access is or is not granted.

Access Allowed

This check box indicates if access is allowed or denied. A selected check box
indicates access is allowed. A clear check box indicates access is denied.

Action

Click

to delete a user account from the vCAS.

Table 4.8 Permitted Shell Logins

Performing Optional Configuration

From the Tools menu, you can configure the following options:

l

Authentication

l

Email Alerts

l

Licensing

l

Preferences

l

Remote Logging

l

Setup

l

Software Updates

Authentication

Incoming connections are authenticated using X.509 certificates. Some of these certificates are revoked
before they expire. The Authentication dialog box allows administrators to select the way the vCAS
checks the setting of the X.509 certificates. There are three options for certificate revocation checking:
OCSP, CRL, and No Check.

Figure 4.8 Authentication

HP Remote Device Access 8.1: vCAS User Guide

Page 36 of 65

Chapter 4: Managing your vCAS