beautypg.com

17 systems insight manager custom tools, 18 understanding systems insight manager security – HP Systems Insight Manager User Manual

Page 5

background image

Scheduling tools..............................................................................................................................58
Managing with tasks........................................................................................................................58
Viewing results................................................................................................................................59
Example - Device ping......................................................................................................................59

IV Systems Insight Manager advanced features................................................60

16 Collections in Systems Insight Manager 6.0

............................................61

Collections in Systems Insight Manager...............................................................................................61

Types of collections.....................................................................................................................62
Other customization features........................................................................................................63

17 Systems Insight Manager custom tools

....................................................68

General concepts............................................................................................................................68

Tool types..................................................................................................................................68
Environment variables for custom tools...........................................................................................69
Custom tool menu placement........................................................................................................70
Custom tool URL format...............................................................................................................71

Creating custom tools through the GUI................................................................................................71

New.........................................................................................................................................72
Edit...........................................................................................................................................72
View tool definition.....................................................................................................................72
Run Now/Schedule....................................................................................................................72
Delete.......................................................................................................................................72

Creating custom tools through the Systems Insight Manager CLI.............................................................72

Creating a custom SSA tool..........................................................................................................72
Example Web launch tool............................................................................................................75
Example MSA tool......................................................................................................................75
Example Enabling Remote Desktop tool.........................................................................................76
Adding a TDEF to Systems Insight Manager...................................................................................77
Removing a TDEF from Systems Insight Manager.............................................................................77
Modifying a TDEF.......................................................................................................................78

18 Understanding Systems Insight Manager security

.....................................79

Securing communication...................................................................................................................79

Secure Sockets Layer (SSL)...........................................................................................................79
Secure Shell (SSH)......................................................................................................................79
Hyper Text Transfer Protocol Secure (HTTPS)...................................................................................79
Secure Task Execution (STE) and Single Sign-On (SSO)....................................................................79
Distributed Task Facility (DTF).......................................................................................................79
WBEM......................................................................................................................................80
LDAP.........................................................................................................................................80
RMI..........................................................................................................................................80

Credentials management..................................................................................................................80

SSL certificates...........................................................................................................................80
Certificate sharing......................................................................................................................80
SSH keys...................................................................................................................................80
Passwords..................................................................................................................................80

Browser..........................................................................................................................................81

SSL...........................................................................................................................................81
Cookies.....................................................................................................................................81
Passwords..................................................................................................................................81
Password warnings.....................................................................................................................81
Browser session..........................................................................................................................81
Internet Explorer zones................................................................................................................82
System link format.......................................................................................................................82

Operating-system dependencies.........................................................................................................82

User accounts and authentication.................................................................................................82
File system.................................................................................................................................82
Background processes.................................................................................................................83
Windows Cygwin.......................................................................................................................83

Table of Contents

5