Authentication Profile

The Authentication Profile module manages user authentication for accessing network devices via CLI (Command Line Interface) sessions. It ensures that only authorized users can establish CLI sessions with network devices by verifying their identity before granting access.

This is a privilege-based feature: Users can only view, add, edit, delete, execute, or export authentication profiles if they have the necessary permissions assigned by the administrator.

What do you see on the screen

Basic Details | Authentication Profile

Label

Action

Description/Example

Search

Enter keywords to search for a specific profile.

Example: "Admin Profile"

Filter

Apply filters based on predefined fields and conditions.

Fields: Profile Name, Status, User Tag, Asset Tag, Device IP Address, Device Credential. Conditions: In, Not In, Equal To, Not Equal To.

CLI Jobs

Click to navigate to the CLI Jobs module.

CLI Jobs establish direct CLI sessions (SSH or Telnet) between a device and a user via the NCCM application, allowing users to execute commands similar to PuTTY.

Add

Click to create a new Authentication Profile.

Example: Add a profile for network administrators with specific device access.

Profile Name

View-only field.

A unique identifier for the authentication profile is used to distinguish different access configurations.

Example: "Admin-Access"

IP Address

View-only field.

The IP address of the network device associated with this profile.

Example: "192.168.1.1"

Asset Tag

View-only field.

A unique tag is assigned to a device for tracking and identification within the inventory.

Example: "Router-001"

User Name(s)

View-only field.

The list of users associated with the profile authorized to access the device.

Example: "admin, user1"

Device Credential

View-only field.

The authentication method used for accessing the device, such as SSH keys, passwords, or certificates.

Example: "SSH Key - Admin"

Protocol

View-only field.

The communication protocol used for CLI access. Supported options include SSH and Telnet.

Example: "SSH" or "Telnet"

Description

View-only field.

A brief note explaining the purpose or function of the profile.

Example: "Admin profile for core routers."

Status

View-only field.

Indicates whether the profile is active or inactive.

Example: "Active" or "Inactive"

Visibility

View-only field.

Defines whether the profile is Public (accessible to all authorized users) or Private (restricted access).

Example: "Public" or "Private"

Action Icons

Edit

Select a profile, make necessary modifications, and save changes.

Editing follows the same procedure as the Add operation.

Clone

Duplicate an existing profile with minor modifications.

Select a profile and click Clone. The Add Authentication Profile page appears with pre-filled details—modify as needed and save.

Delete

Remove a selected authentication profile.

Example: Delete an obsolete profile no longer in use.

Detail View

Open a pop-up with detailed profile information.

Displays User Name(s), Email, Profile Name, IP Address, and Status.

Bulk Actions

Enable

Select multiple profiles and enable them in bulk.

Enabled profiles will be marked as Active.

Disable

Select multiple profiles and disable them in bulk.

Disabled profiles will be marked as Inactive.

Delete

Remove multiple authentication profiles at once.

Example: Bulk-delete outdated or unnecessary profiles.

Add Authentication Profile

To add a new authentication profile, click on the Add option located at the top right corner of the page. Fill in the required details as outlined in the table below:

Add Details | Authentication Profile

Label

Action

Description/Example

Profile Name*

Enter a unique name for the authentication profile.

Example: "Admin-Access"

Description*

Provide a brief description of the authentication profile.

Example: "Admin profile for critical network devices."

Status

Toggle between ON (Active) or OFF (Inactive) to enable or disable the profile.

Default: "ON"

IP Address

Enter the device management IP address. Accepts a single IP or a list of IPs separated by commas, semicolons, or spaces.

Example: "192.168.1.1; 192.168.1.2, 192.168.1.3"

Alternatively, import IP addresses from a CSV file. Click the Download icon to get a sample CSV template.

Example CSV: "Device Name, IP Address"

Asset Tag

Select from the drop-down.

Choose the appropriate asset tags for device grouping.

Example: "Router-001, Switch-002"

User

Select a user from the drop-down list.

Example: "admin, user1"

User Tag

Select a predefined user group from the drop-down list.

Example: "Network Admins, IT Support"

Protocol

Select the access protocol from the drop-down.

Options: "SSH, TELNET"

Device Credential

Select the appropriate credential method for authentication.

Example: "SSH Key - Admin, Password Auth"

Visibility

Choose profile visibility.

Public (accessible to authorized users) or Private (restricted access).

Note:

  • You can add devices using either IP Address or Asset Tag.

  • You can select individual users or assign a User Tag to group users under a common profile.

Once all details are entered, click Submit to save and add the authentication profile to the inventory.

Last updated

Was this helpful?