Device Credentials

The device Credentials module of Infraon is used by the administrator or authorized user to configure and store Device/Account information such as login credentials (user name, password, and other protocol-relevant parameters) for a specific connection protocol. Device Credentials are used in ‘Discovery‘ and are mandatory for discovering devices for monitoring and management.

Appropriate device communication protocol must be selected while configuring device credentials to build successful connectivity.

Each device shall be associated with a device credential at the time of discovery. Subsequent monitoring is done using these stored credentials. Should the login credentials (password) change, the administrator must update them to ensure seamless monitoring.

Devices and Protocols

At this point, Infraon supports SNMP, WMI, SSH, and HTTP protocols below. Refer to the table below for details.

Protocols

Description

Supported Devices

Protocol Parameters

SNMP

SNMP v1 and v2c versions use community-based security models and user read& Write Community for access. SNMP v3 version uses an enhanced user-based security model and uses authentication and encryption. If v3 is selected, related parameters need to be configured. Refer ’SNMP v3 Parameters’ section for details.

Most Network devices, Servers, and other SNMP-supported devices.

SNMP v1 and v2c: Read & Write Community, Port, Timeout, and Retries.

SNMP v3: Username, Security Level, Authentication Type, SNM V3 Password, Privacy Type & Privacy Password.

SSH

SSH or Secure Shell protocol establishes an encrypted connection between network devices.

CLI Option for network devices, Linux, Unix-based servers, and Xen servers.

Login Name, Login Prompt, Password Port, SH Key File, Connection Command, Timeout, and Retries.

WMI

WMI commonly uses CIM conceptual model to represent various components of windows devices.

Windows Servers

Domain Name/user Name, Password, Authentication Level, Impersonation level, Timeout, and Retries.

HTTP

HTTP acts as the foundation of data exchange on the web.

vCenter, VMware API, CUCM cluster

Username and Password

Click 'Test and Save' to test the credentials for authenticity before saving and proceeding to discovery.

What you see on the screen

The device credentials page can be used to add, edit, and delete device credentials for SNMP, SSH, WMI, and HTTP.

Using the respective icon, the device credential view can be toggled between the card view and the list view.

Instructions to 'Add Device Credential'

  • Go to Infraon Configuration -> IT Operations-> Device Credentials.

  • Click on 'Add' and select 'Protocol' as desired.

There are two tabs on the 'Add Credential' page. Refer to the table for information.

Configuration | Test

Few fields vary based on the protocol selected. Refer to the 'Description' column for details.

Label

Action

Description/Example

Profile Name*

Add a name for the credential.

Applicable for all protocols. A name is usually used as an identifier.

Description

Add a brief description of the profile.

Applicable for all protocols.

Port

The default value is auto-populated. This, however, can be changed.

Applicable for SNMP and SSH.

Timeout (Seconds)

The default value is auto-populated. This, however, can be changed.

Applicable for all protocols.

The number of seconds post which Infraon stops attempting to reach the device.

Retries

The default value is auto-populated. This, however, can be changed.

Applicable for all protocols.

The number of instances Infraon tries to reach the device.

For SNMP

Select the SNMP version, as applicable. Based on the selection, additional fields appear.

Applicable for SNMP only

V1 - Read Community*, Write Community

v2c - Read Community*, Write Community, Scan Requests

v3 - User Name, Context Name, Security Level, Authentication Protocol, Authentication Password*, Privacy Protocol, Privacy Password*, Scan Requests

For SSH

Select between Credential, and Public Key, as applicable. Based on the selection, additional fields appear.

Applicable for SSH only

Credential - Login Name*, Password, Login Prompt, Enable Password, Enable Prompt

Public Key - Hash Key*

v3 - User Name, Context Name, Security Level, Authentication Protocol, Authentication Password*, Privacy Protocol, Privacy Password*, Scan Requests.

For WMI

Select between WMIC, and WinRM, as applicable. Based on the selection, additional fields appear.

Applicable for WMI only

Login Name* and Password* are standard fields for WMIC and WinRM.

WMIC - Authentication

WinRM - WinRM Authentication Level, Protocol, WinRM Port, WinRM Certificate Validation, WinRM Certificate File, WinRM Public Key.

For HTTP

Select between HTTP, and HTTPS, as applicable. Based on the selection, additional fields appear.

Applicable for HTTP/HTTPS only

HTTP - Username*, Password*

HTTPS - Username*, Password*,

Once all the parameters are defined, click ‘Submit’ to save the credentials or click 'Test & Save' to test the credentials before saving.

Configuration | Test

Label

Action

Description/Example

IP Address*

Add an IP address to test the credential.

Applicable for all protocols.

Agent*

Select agent to test.

Applicable for all protocols

Click 'Test.'

Saved credentials can be edited or deleted by using the respective action icons.

Note: Credentials must be correct to ensure seamless discovery.

Last updated