17 systems insight manager custom tools, 18 understanding systems insight manager security – HP Systems Insight Manager User Manual
Page 5
Scheduling tools..............................................................................................................................58
Managing with tasks........................................................................................................................58
Viewing results................................................................................................................................59
Example - Device ping......................................................................................................................59
IV Systems Insight Manager advanced features................................................60
16 Collections in Systems Insight Manager 6.0
............................................61
Types of collections.....................................................................................................................62
Other customization features........................................................................................................63
17 Systems Insight Manager custom tools
....................................................68
Tool types..................................................................................................................................68
Environment variables for custom tools...........................................................................................69
Custom tool menu placement........................................................................................................70
Custom tool URL format...............................................................................................................71
Creating a custom SSA tool..........................................................................................................72
Example Web launch tool............................................................................................................75
Example MSA tool......................................................................................................................75
Example Enabling Remote Desktop tool.........................................................................................76
Adding a TDEF to Systems Insight Manager...................................................................................77
Removing a TDEF from Systems Insight Manager.............................................................................77
Modifying a TDEF.......................................................................................................................78
18 Understanding Systems Insight Manager security
.....................................79
Secure Sockets Layer (SSL)...........................................................................................................79
Secure Shell (SSH)......................................................................................................................79
Hyper Text Transfer Protocol Secure (HTTPS)...................................................................................79
Secure Task Execution (STE) and Single Sign-On (SSO)....................................................................79
Distributed Task Facility (DTF).......................................................................................................79
WBEM......................................................................................................................................80
LDAP.........................................................................................................................................80
RMI..........................................................................................................................................80
SSL...........................................................................................................................................81
Cookies.....................................................................................................................................81
Passwords..................................................................................................................................81
Password warnings.....................................................................................................................81
Browser session..........................................................................................................................81
Internet Explorer zones................................................................................................................82
System link format.......................................................................................................................82
User accounts and authentication.................................................................................................82
File system.................................................................................................................................82
Background processes.................................................................................................................83
Windows Cygwin.......................................................................................................................83
Table of Contents
5