beautypg.com

18 federated cms search, 19 cms reconfigure tools, 20 understanding systems insight manager security – HP Systems Insight Manager User Manual

Page 6

background image

Run Now/Schedule.......................................................................................................80
Delete..........................................................................................................................80

Creating custom tools through the Systems Insight Manager CLI...............................................80

Creating a custom SSA tool............................................................................................80
Example Web launch tool..............................................................................................82
Example MSA tool........................................................................................................83
Example Enabling Remote Desktop tool............................................................................84
Adding a TDEF to Systems Insight Manager......................................................................85
Removing a TDEF from Systems Insight Manager...............................................................85
Modifying a TDEF.........................................................................................................86

18 Federated CMS Search........................................................................87

Federated CMS Configuration.............................................................................................87

19 CMS reconfigure tools.........................................................................89

Operational Commands, Options and Parameters..................................................................89
Reconfiguring the CMS password.........................................................................................89

Warnings.....................................................................................................................91
Dependencies...............................................................................................................91

Reconfiguring the CMS host and IP attributes.........................................................................91

Warning......................................................................................................................92
Dependencies...............................................................................................................92

Reconfiguring the CMS database credentials.........................................................................92

Warning......................................................................................................................92
Dependencies...............................................................................................................93

Reconfiguring the CMS to use a different database................................................................93

Warning......................................................................................................................93
Dependencies...............................................................................................................93

20 Understanding Systems Insight Manager security....................................94

Securing communication.....................................................................................................94

Secure Sockets Layer (SSL)..............................................................................................94
Secure Shell (SSH).........................................................................................................94
Hyper Text Transfer Protocol Secure (HTTPS)......................................................................94
Secure Task Execution (STE) and Single Sign-On (SSO)......................................................94
Distributed Task Facility (DTF)..........................................................................................94
WBEM........................................................................................................................95
LDAP...........................................................................................................................95
RMI.............................................................................................................................95

Credentials management....................................................................................................95

SSL certificates..............................................................................................................95
Certificate sharing.........................................................................................................95
SSH keys......................................................................................................................96
Passwords....................................................................................................................96

Browser............................................................................................................................96

SSL..............................................................................................................................96
Cookies.......................................................................................................................96
Passwords....................................................................................................................96
Password warnings........................................................................................................96
Browser session.............................................................................................................97
Internet Explorer zones...................................................................................................97
System link format.........................................................................................................97

Operating-system dependencies...........................................................................................98

6

Contents