Infraon Infinity
API DocsAdmin GuideUser GuideVideo LibraryResources
  • Infraon Documentation
  • Explore More
    • What's New
    • Use Cases
      • Dashboard
        • Default Dashboard
        • Add a Dashboard
        • Miscellaneous
      • Asset
        • IT & Fixed Asset
          • Asset Categories
          • Add Asset
            • Adding an Asset Manually
            • Adding an asset using CSV
            • Adding an asset using Inventory Agent
          • Miscellaneous
        • Software Inventory
        • Software License Management
        • CMDB view
      • Ticket Management
        • Ticket Creation
          • Created by Techician
          • Email to incident
          • Self Service Portal
          • Trigger Configuration
        • Ticket Assignment
          • Ticket Assignment (Manual)
          • Ticket Assignment (Automatic)
        • Ticket Resolution
        • Miscellaneous
    • Handbooks
    • Video Library: Infraon Infinity
      • Dashboard
      • Assets
        • IT & Fixed Asset
          • Add an Asset
        • Software Inventory
        • Software License
        • CMDB View
      • Ticket Management
        • Ticket Creation
        • Ticket Assignment
        • Ticket Resolution
        • Miscellaneous
      • Request Management
      • Problem Management
      • Change Management
      • Release Management
      • Event Management
      • Report
      • SLA Management
      • Network Diagram
      • Topology
      • Geomap
      • Infraon Configuration
        • General Settings
        • User Management
        • Service Management
        • Notifications
        • Infraon Automation
        • Bots
        • Organization
        • IT Operations
          • Advance Resource Configuration
          • Blacklist and Whitelist
          • Discovery
          • Diagnosis Tools
          • Device Credentials
          • Maintenance
          • Correlation Rules
          • Network Configuration
          • Thresholds
  • Infinity Admin Guide
    • Overview
    • Getting Started
      • Welcome to Infraon!
      • Know Infraon!
      • User's first login
  • Infraon Platform
    • Account Signup
    • CI Rule Configuration
    • Infraon URL
    • Login Settings
    • Module Prefix Configuration
    • Rebrand Infraon
    • Template Configuration
    • Vendor
    • SSP Configuration
  • Infinity User Guide
    • Introduction
    • Workspace
    • Dashboard
      • Widgets
      • Add a Dashboard
    • Asset
      • Asset Lifecycle
      • How does it work?
      • Asset Types
      • Asset Categories/Sub-Categories
      • Asset Grid Page
      • Add Asset/Add Item
      • Asset Information – SDH / PDH
      • Consumable Asset (Beta)
      • Software Assets
      • Software License
      • CMDB View
        • CI relationship in CMDB Downstream
        • CI relationship in CMDB Upstream
    • Contract Management
      • Add contract
    • NCCM
      • Download Job
      • Calendar View
    • IMACD (Beta)
      • Instructions to add a process
      • Gate pass
    • Ticket Management
      • Tickets
      • Add ticket
    • Request Management
      • Request
      • Add Request
    • Problem Management
      • Problem
      • Add Problem
    • Change Management
      • Change
      • Add Change
    • Log Management
      • Log Search
      • Log Stream
    • Release Management
      • What you see on the screen
      • Instructions to add a New Release
    • Event Management
      • Events
    • Report
      • How does it work
      • Add Report
    • Knowledge Base
      • Infraon's Knowledge Base
    • SLA Management
      • SLA
      • Profile
    • Geomap
      • What you see on the screen
    • Network Diagram (Beta)
      • How does it work?
    • Topology
      • Topological Links
    • Infraon Configuration
      • General Settings
        • Audits
        • Business Hours
        • Tag Management
        • API Registration
      • User Management
        • Department
        • Active users
        • Leaves
        • My Leaves
        • Password Policy
        • Requesters
        • Roles & Privileges
        • Teams
        • Users
        • Shift Configuration
      • Service Management
        • Service Catalogue
      • Notifications
        • Configure SMS
        • Configure SMTP
        • Messenger Audit
        • Trigger Configuration
      • Infraon Automation
        • Business Rule
          • Manual Service Mapping
        • Escalation
        • Email Integration
        • Customer Feedback Template
        • Mail Automator
        • Microsoft Outlook
        • Workflow
          • Advanced Options
          • Task Workflow
      • Bots
        • Bots assistance
        • Data Collector
        • Inventory Agent
      • Organization
        • Address Book
        • License
        • Asynchronous Task Manager
      • IT Operations
        • Advance Resource Configuration
        • Blacklist and Whitelist
        • CLI Jobs
        • Circuit Discovery
        • Device Credentials
        • Diagnosis Tools
        • Discovery
          • Automatic Discovery
          • Network Discovery
          • Windows Servers
          • Linux Servers
          • Hypervisor Monitoring
          • VMware
          • URL/ Web Services
          • Wireless Controller
        • Job Progress
        • Maintenance
        • Network Configuration
          • Baseline Scheduler
          • Configuration Comparison
          • Configuration File Compare
          • Configuration Parameters
          • Configuration Profile
          • Configuration Search
          • Configuration Template
            • What you see on the screen
            • How to write Command Portion in Template
            • Conditioning in Template
            • Guidelines for Configuration Template
            • Add Template
              • Miscellaneous
          • Generate MD5
          • Jobs Account Audit
          • OS Image
            • OS Image Download Scheduler
          • Configuration Trigger
          • Job(s) Retry Queue
          • Workflow Jobs
          • Rules
          • Rule Group
          • Policy
          • Manage Vulnerabilities
            • Vulnerabilities by CVE
            • Vulnerabilities by Assets
            • Vulnerabilities Database
          • Download Jobs
            • What you see on the screen
            • Add Download Job
          • Upload Jobs
            • What you see on the screen
            • Add Upload Job
          • Service Template
            • Service Job
          • Authentication Profile
          • Authorization Profile
        • Rules
          • Log Rule
          • Correlation Rule
        • Thresholds
        • Trap Configuration
      • Log Management
        • Log Multi-Index
        • Log Search
        • Log Stream
        • Export Configs
    • Marketplace (Beta)
      • Azure Active Directory
      • Infraon Dell
      • Google Workspace
      • Infraon JAMF
      • Infraon ServiceNow
      • Infraon Slack
      • Infraon Teams
      • Infraon WhatsApp
      • Infraon Ring Central
      • Infraon LDAP
      • Infraon JIRA
Powered by GitBook
On this page
  • What do you see on the screen
  • Add Authentication Profile

Was this helpful?

  1. Infinity User Guide
  2. Infraon Configuration
  3. IT Operations
  4. Network Configuration

Authentication Profile

The Authentication Profile module manages user authentication for accessing network devices via CLI (Command Line Interface) sessions. It ensures that only authorized users can establish CLI sessions with network devices by verifying their identity before granting access.

This is a privilege-based feature: Users can only view, add, edit, delete, execute, or export authentication profiles if they have the necessary permissions assigned by the administrator.

What do you see on the screen

Basic Details | Authentication Profile

Label

Action

Description/Example

Search

Enter keywords to search for a specific profile.

Example: "Admin Profile"

Filter

Apply filters based on predefined fields and conditions.

Fields: Profile Name, Status, User Tag, Asset Tag, Device IP Address, Device Credential. Conditions: In, Not In, Equal To, Not Equal To.

CLI Jobs

Click to navigate to the CLI Jobs module.

CLI Jobs establish direct CLI sessions (SSH or Telnet) between a device and a user via the NCCM application, allowing users to execute commands similar to PuTTY.

Add

Click to create a new Authentication Profile.

Example: Add a profile for network administrators with specific device access.

Profile Name

View-only field.

A unique identifier for the authentication profile is used to distinguish different access configurations.

Example: "Admin-Access"

IP Address

View-only field.

The IP address of the network device associated with this profile.

Example: "192.168.1.1"

Asset Tag

View-only field.

A unique tag is assigned to a device for tracking and identification within the inventory.

Example: "Router-001"

User Name(s)

View-only field.

The list of users associated with the profile authorized to access the device.

Example: "admin, user1"

Device Credential

View-only field.

The authentication method used for accessing the device, such as SSH keys, passwords, or certificates.

Example: "SSH Key - Admin"

Protocol

View-only field.

The communication protocol used for CLI access. Supported options include SSH and Telnet.

Example: "SSH" or "Telnet"

Description

View-only field.

A brief note explaining the purpose or function of the profile.

Example: "Admin profile for core routers."

Status

View-only field.

Indicates whether the profile is active or inactive.

Example: "Active" or "Inactive"

Visibility

View-only field.

Defines whether the profile is Public (accessible to all authorized users) or Private (restricted access).

Example: "Public" or "Private"

Action Icons

Edit

Select a profile, make necessary modifications, and save changes.

Editing follows the same procedure as the Add operation.

Clone

Duplicate an existing profile with minor modifications.

Select a profile and click Clone. The Add Authentication Profile page appears with pre-filled details—modify as needed and save.

Delete

Remove a selected authentication profile.

Example: Delete an obsolete profile no longer in use.

Detail View

Open a pop-up with detailed profile information.

Displays User Name(s), Email, Profile Name, IP Address, and Status.

Bulk Actions

Enable

Select multiple profiles and enable them in bulk.

Enabled profiles will be marked as Active.

Disable

Select multiple profiles and disable them in bulk.

Disabled profiles will be marked as Inactive.

Delete

Remove multiple authentication profiles at once.

Example: Bulk-delete outdated or unnecessary profiles.

Add Authentication Profile

To add a new authentication profile, click on the Add option located at the top right corner of the page. Fill in the required details as outlined in the table below:

Add Details | Authentication Profile

Label

Action

Description/Example

Profile Name*

Enter a unique name for the authentication profile.

Example: "Admin-Access"

Description*

Provide a brief description of the authentication profile.

Example: "Admin profile for critical network devices."

Status

Toggle between ON (Active) or OFF (Inactive) to enable or disable the profile.

Default: "ON"

IP Address

Enter the device management IP address. Accepts a single IP or a list of IPs separated by commas, semicolons, or spaces.

Example: "192.168.1.1; 192.168.1.2, 192.168.1.3"

Alternatively, import IP addresses from a CSV file. Click the Download icon to get a sample CSV template.

Example CSV: "Device Name, IP Address"

Asset Tag

Select from the drop-down.

Choose the appropriate asset tags for device grouping.

Example: "Router-001, Switch-002"

User

Select a user from the drop-down list.

Example: "admin, user1"

User Tag

Select a predefined user group from the drop-down list.

Example: "Network Admins, IT Support"

Protocol

Select the access protocol from the drop-down.

Options: "SSH, TELNET"

Device Credential

Select the appropriate credential method for authentication.

Example: "SSH Key - Admin, Password Auth"

Visibility

Choose profile visibility.

Public (accessible to authorized users) or Private (restricted access).

Note:

  • You can add devices using either IP Address or Asset Tag.

  • You can select individual users or assign a User Tag to group users under a common profile.

Once all details are entered, click Submit to save and add the authentication profile to the inventory.

PreviousService JobNextAuthorization Profile

Last updated 1 month ago

Was this helpful?