Device Credentials
The device Credentials module of Infraon is used by the administrator or authorized user to configure and store Device/Account information such as login credentials (user name, password, and other protocol-relevant parameters) for a specific connection protocol. Device Credentials are used in ‘Discovery‘ and are mandatory for discovering devices for monitoring and management.
Appropriate device communication protocol must be selected while configuring device credentials to build successful connectivity.
Each device shall be associated with a device credential at the time of discovery. Subsequent monitoring is done using these stored credentials. Should the login credentials (password) change, the administrator must update them to ensure seamless monitoring.
Devices and Protocols
At this point, Infraon supports SNMP, WMI, SSH, and HTTP protocols below. Refer to the table below for details.
Protocols
Description
Supported Devices
Protocol Parameters
SNMP
SNMP v1 and v2c versions use community-based security models and user read& Write Community for access. SNMP v3 version uses an enhanced user-based security model and uses authentication and encryption. If v3 is selected, related parameters need to be configured. Refer ’SNMP v3 Parameters’ section for details.
Most Network devices, Servers, and other SNMP-supported devices.
SNMP v1 and v2c: Read & Write Community, Port, Timeout, and Retries.
SNMP v3: Username, Security Level, Authentication Type, SNM V3 Password, Privacy Type & Privacy Password.
SSH
SSH or Secure Shell protocol establishes an encrypted connection between network devices.
CLI Option for network devices, Linux, Unix-based servers, and Xen servers.
Login Name, Login Prompt, Password Port, SH Key File, Connection Command, Timeout, and Retries.
WMI
WMI commonly uses CIM conceptual model to represent various components of windows devices.
Windows Servers
Domain Name/user Name, Password, Authentication Level, Impersonation level, Timeout, and Retries.
HTTP
HTTP acts as the foundation of data exchange on the web.
vCenter, VMware API, CUCM cluster
Username and Password
Click 'Test and Save' to test the credentials for authenticity before saving and proceeding to discovery.
What you see on the screen
The device credentials page can be used to add, edit, and delete device credentials for SNMP, SSH, WMI, and HTTP.
Using the respective icon, the device credential view can be toggled between the card view and the list view.
Instructions to 'Add Device Credential'
Go to Infraon Configuration -> IT Operations-> Device Credentials.
Click on 'Add' and select 'Protocol' as desired.
There are two tabs on the 'Add Credential' page. Refer to the table for information.
Configuration | Test
Few fields vary based on the protocol selected. Refer to the 'Description' column for details.
Label
Action
Description/Example
Profile Name*
Add a name for the credential.
Applicable for all protocols. A name is usually used as an identifier.
Description
Add a brief description of the profile.
Applicable for all protocols.
Port
The default value is auto-populated. This, however, can be changed.
Applicable for SNMP and SSH.
Timeout (Seconds)
The default value is auto-populated. This, however, can be changed.
Applicable for all protocols.
The number of seconds post which Infraon stops attempting to reach the device.
Retries
The default value is auto-populated. This, however, can be changed.
Applicable for all protocols.
The number of instances Infraon tries to reach the device.
For SNMP
Select the SNMP version, as applicable. Based on the selection, additional fields appear.
Applicable for SNMP only
V1 - Read Community*, Write Community
v2c - Read Community*, Write Community, Scan Requests
v3 - User Name, Context Name, Security Level, Authentication Protocol, Authentication Password*, Privacy Protocol, Privacy Password*, Scan Requests
For SSH
Select between Credential, and Public Key, as applicable. Based on the selection, additional fields appear.
Applicable for SSH only
Credential - Login Name*, Password, Login Prompt, Enable Password, Enable Prompt
Public Key - Hash Key*
v3 - User Name, Context Name, Security Level, Authentication Protocol, Authentication Password*, Privacy Protocol, Privacy Password*, Scan Requests.
For WMI
Select between WMIC, and WinRM, as applicable. Based on the selection, additional fields appear.
Applicable for WMI only
Login Name* and Password* are standard fields for WMIC and WinRM.
WMIC - Authentication
WinRM - WinRM Authentication Level, Protocol, WinRM Port, WinRM Certificate Validation, WinRM Certificate File, WinRM Public Key.
For HTTP
Select between HTTP, and HTTPS, as applicable. Based on the selection, additional fields appear.
Applicable for HTTP/HTTPS only
HTTP - Username*, Password*
HTTPS - Username*, Password*,
Once all the parameters are defined, click ‘Submit’ to save the credentials or click 'Test & Save' to test the credentials before saving.
Configuration | Test
Label
Action
Description/Example
IP Address*
Add an IP address to test the credential.
Applicable for all protocols.
Agent*
Select agent to test.
Applicable for all protocols
Click 'Test.'
Saved credentials can be edited or deleted by using the respective action icons.
Note: Credentials must be correct to ensure seamless discovery.
Last updated