HP Systems Insight Manager 5.2 Installation and Configuration Guide for HP-UX

provide encrypted access. When you use one of these applications to access HP SIM, your data, including
your password, is transmitted across the network unencrypted. In addition, these protocols are not
spoof-protected.
Graphical user interface
When you access the HP SIM from a web browser, you log in using the secure HTML login page. The user
name and password for the login page are the same as your CMS operating system user name and password.
Your information is securely transmitted using the SSL protocol. SSL provides data encryption and server
authentication by using a public and private key technology. The web server on the CMS uses a certificate
for server authentication. By default, this certificate is self-signed, but it can be replaced by a certificate that
is signed by a trusted certificate authority. Your web browser should import this certificate to trust the CMS.
Network Client
Server
SSH
Tomcat
Web Server
HTTPS
Web Browser
SSH Client
SSH
DMI
SNMP
WBEM
HP-UX
Managed System
SSH
SNMP
WBEM
LINUX
Managed System
SSH
ProLiant
Support Pack
SNMP
WMI
Windows
Managed System
HP Systems
Insight
Manager
SSH
DMI
SNMP
WBEM
SSH
SNMP
WBEM
HTTPS
ProLiant
Support Pack
Secure data transmission
The security of the transaction depends on your networking environment and the management protocol that
each tool is using.
Management protocols
The basic supported management protocols and applications are
SSH
,
Web-Based Enterprise Management
(WBEM)
,
Secure HTTP (HTTPS)
,
Desktop Management Interface (DMI)
, and
SNMP
. Tools are not limited to
these protocols, and they can provide a custom management protocol. SSH is the only protocol that must
be installed on every managed system. Tools require specific protocols, and they can only be run on a
managed system if the protocol they require is installed and configured correctly.
SSH SSH is a program that enables you to log in to another system over a network and execute commands
on that system. It also enables you to move files from one system to another, and it provides authentication
and secure communications over insecure channels. SSH uses a public/private key pair to provide a secure
mechanism to authenticate and encrypt communication. SSH keys are used to identify the execute-as user
on the managed system. Typically, the execute-as user is either root or administrator, but other users can be
configured, depending on the tool that will be executed on the managed system. The private key is kept
secure on the CMS, while the public key is installed on each managed system.
14 Product overview