Authentication Profile
The Authentication Profile module manages user authentication for accessing network devices via CLI (Command Line Interface) sessions. It ensures that only authorized users can establish CLI sessions with network devices by verifying their identity before granting access.
This is a privilege-based feature: Users can only view, add, edit, delete, execute, or export authentication profiles if they have the necessary permissions assigned by the administrator.
What do you see on the screen
Basic Details | Authentication Profile
Label
Action
Description/Example
Search
Enter keywords to search for a specific profile.
Example: "Admin Profile"
Filter
Apply filters based on predefined fields and conditions.
Fields: Profile Name, Status, User Tag, Asset Tag, Device IP Address, Device Credential. Conditions: In, Not In, Equal To, Not Equal To.
CLI Jobs
Click to navigate to the CLI Jobs module.
CLI Jobs establish direct CLI sessions (SSH or Telnet) between a device and a user via the NCCM application, allowing users to execute commands similar to PuTTY.
Add
Click to create a new Authentication Profile.
Example: Add a profile for network administrators with specific device access.
Profile Name
View-only field.
A unique identifier for the authentication profile is used to distinguish different access configurations.
Example: "Admin-Access"
IP Address
View-only field.
The IP address of the network device associated with this profile.
Example: "192.168.1.1"
Asset Tag
View-only field.
A unique tag is assigned to a device for tracking and identification within the inventory.
Example: "Router-001"
User Name(s)
View-only field.
The list of users associated with the profile authorized to access the device.
Example: "admin, user1"
Device Credential
View-only field.
The authentication method used for accessing the device, such as SSH keys, passwords, or certificates.
Example: "SSH Key - Admin"
Protocol
View-only field.
The communication protocol used for CLI access. Supported options include SSH and Telnet.
Example: "SSH" or "Telnet"
Description
View-only field.
A brief note explaining the purpose or function of the profile.
Example: "Admin profile for core routers."
Status
View-only field.
Indicates whether the profile is active or inactive.
Example: "Active" or "Inactive"
Visibility
View-only field.
Defines whether the profile is Public (accessible to all authorized users) or Private (restricted access).
Example: "Public" or "Private"
Action Icons
Edit
Select a profile, make necessary modifications, and save changes.
Editing follows the same procedure as the Add operation.
Clone
Duplicate an existing profile with minor modifications.
Select a profile and click Clone. The Add Authentication Profile page appears with pre-filled details—modify as needed and save.
Delete
Remove a selected authentication profile.
Example: Delete an obsolete profile no longer in use.
Detail View
Open a pop-up with detailed profile information.
Displays User Name(s), Email, Profile Name, IP Address, and Status.
Bulk Actions
Enable
Select multiple profiles and enable them in bulk.
Enabled profiles will be marked as Active.
Disable
Select multiple profiles and disable them in bulk.
Disabled profiles will be marked as Inactive.
Delete
Remove multiple authentication profiles at once.
Example: Bulk-delete outdated or unnecessary profiles.
Add Authentication Profile
To add a new authentication profile, click on the Add option located at the top right corner of the page. Fill in the required details as outlined in the table below:
Add Details | Authentication Profile
Label
Action
Description/Example
Profile Name*
Enter a unique name for the authentication profile.
Example: "Admin-Access"
Description*
Provide a brief description of the authentication profile.
Example: "Admin profile for critical network devices."
Status
Toggle between ON (Active) or OFF (Inactive) to enable or disable the profile.
Default: "ON"
IP Address
Enter the device management IP address. Accepts a single IP or a list of IPs separated by commas, semicolons, or spaces.
Example: "192.168.1.1; 192.168.1.2, 192.168.1.3"
Alternatively, import IP addresses from a CSV file. Click the Download icon to get a sample CSV template.
Example CSV: "Device Name, IP Address"
Asset Tag
Select from the drop-down.
Choose the appropriate asset tags for device grouping.
Example: "Router-001, Switch-002"
User
Select a user from the drop-down list.
Example: "admin, user1"
User Tag
Select a predefined user group from the drop-down list.
Example: "Network Admins, IT Support"
Protocol
Select the access protocol from the drop-down.
Options: "SSH, TELNET"
Device Credential
Select the appropriate credential method for authentication.
Example: "SSH Key - Admin, Password Auth"
Visibility
Choose profile visibility.
Public (accessible to authorized users) or Private (restricted access).
Once all details are entered, click Submit to save and add the authentication profile to the inventory.
Last updated
Was this helpful?