Hp Insight Management Agents User Manual Page 17

  • Download
  • Add to my manuals
  • Print
  • Page
    / 99
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 16
HP Insight Management Agents for Servers 17
Management HTTP Server section
The Management HTTP Server section provides links allowing you to configure your Management HTTP Server
settings. The Management HTTP Server section provides links to:
Security
UI Properties
User Preferences
Security
Provides following options and also contains notes which describe the usage of the each of the option available and
also procedure to set the values
Anonymous/Local AccessEnables the administrator to set options that allow anonymous users to access SMH
pages or to allow automatic login to SMH when running in a local console as administrator or anonymous user.
IP BindingEnables you to control the addresses that SMH is bound to. IP Binding specifies the IP addresses
that HP SMH accepts requests from and controls the nets and subnets that requests are processed.
Administrators can configure HP SMH to only bind to addresses specified in the IP Binding window. Five subnet
IP addresses and netmasks can be defined.
IP Restricted LoginEnables you to add addresses from where SMH is accessible or blocked. IP Restricted login
enables HP SMH to restrict login access based on the IP address of a system from which the signing in is
attempted. For Linux and Windows, you can set a restricted address at installation. From all operating systems,
administrators can set a restricted address from the IP Restricted login page.
Kerberos AuthorizationAllows an authorized user to configure the Kerberos authenticated access to HP SMH
and their respective access level. Users with Administrator access can view and set all information provided
through the System Management Homepage. Users with Operator access can view and set most information
provided through the System Management Homepage. Some web applications limit access to the most critical
information to administrators only. Users with User access can view most information provided through the
System Management Homepage. Some web applications restrict viewing of critical information from individuals
with User access.
Local Server Certificate
Current CertificateSMH allows setting a certificate with alternative names in addition to the Common
Name (CN). Server names are separated by semi-colons without blank spaces. Any changes in Alternative
Names here affect only the current certificate
Create PKCS #10 DataThe System Management Homepage can create Certificate Request (PKCS #10)
data which can be sent to a Certificate Authority (CA) at a later time. This data is base64 encoded. The CA
processes this request and return a response file (PKCS #7) which can be imported into the System
Management Homepage. Use the top-left box to create the PKCS #10 Certificate Request data.
The two following fields may be optionally specified. If not specified, they are automatically filled in with
"Hewlett-Packard Company" for the Organization and "Hewlett-Packard Network Management Software
(SMH)" for the Organizational Unit.
SMH allows you to add alternative names to the Certificate Request, in addition to the Common Name
(CN).
Import PKCS #7 DataThe System Management Homepage imports base64 encoded PKCS #7 data which
a Certificate Authority returned based upon an earlier Certificate Request (PKCS #10). Cut-and-paste the
PKCS #7 information into the text box in the left and press the button to import it into the System
Management Homepage
Port 2301Option to enable port id : 2301
TimeoutsUsers with Administrator access can set the session timeout to between 1 and 60 minutes (the default
value is 15 minutes). When a session timeout occurs, the user has to log in again. Users with Administrator
access can set the user interface timeout to between 10 and 3600 seconds (the default value is 20 seconds).
This is the maximum amount of time the System Management Homepage waits for requested information
Trust ModeThe Trust Mode provides options to enable you to select the security required by your system.
Some situations require a higher level of security than others. Other Trust Modes are considered less secure than
certificate based trust modes. The following are the security options in the Trust Mode:
Trust by CertificateSets HP SMH to accept configuration changes only from HP SIM servers with trusted
certificates. This mode requires the submitted server to provide authentication by means of certificates. This
mode is the strongest method of security because it requires certificate data and verifies the digital signature
before allowing access. If you do not want to enable remote configuration changes, leave Trust by
Page view 16
1 2 ... 12 13 14 15 16 17 18 19 20 21 22 ... 98 99

Comments to this Manuals

No comments