HP Systems Insight Manager 6.0 User Guide

Scheduling tools..............................................................................................................................58
Managing with tasks........................................................................................................................58
Viewing results................................................................................................................................59
Example - Device ping......................................................................................................................59
IV Systems Insight Manager advanced features................................................60
16 Collections in Systems Insight Manager 6.0............................................61
Collections in Systems Insight Manager...............................................................................................61
Types of collections.....................................................................................................................62
Other customization features........................................................................................................63
17 Systems Insight Manager custom tools....................................................68
General concepts............................................................................................................................68
Tool types..................................................................................................................................68
Environment variables for custom tools...........................................................................................69
Custom tool menu placement........................................................................................................70
Custom tool URL format...............................................................................................................71
Creating custom tools through the GUI................................................................................................71
New.........................................................................................................................................72
Edit...........................................................................................................................................72
View tool definition.....................................................................................................................72
Run Now/Schedule....................................................................................................................72
Delete.......................................................................................................................................72
Creating custom tools through the Systems Insight Manager CLI.............................................................72
Creating a custom SSA tool..........................................................................................................72
Example Web launch tool............................................................................................................75
Example MSA tool......................................................................................................................75
Example Enabling Remote Desktop tool.........................................................................................76
Adding a TDEF to Systems Insight Manager...................................................................................77
Removing a TDEF from Systems Insight Manager.............................................................................77
Modifying a TDEF.......................................................................................................................78
18 Understanding Systems Insight Manager security.....................................79
Securing communication...................................................................................................................79
Secure Sockets Layer (SSL)...........................................................................................................79
Secure Shell (SSH)......................................................................................................................79
Hyper Text Transfer Protocol Secure (HTTPS)...................................................................................79
Secure Task Execution (STE) and Single Sign-On (SSO)....................................................................79
Distributed Task Facility (DTF).......................................................................................................79
WBEM......................................................................................................................................80
LDAP.........................................................................................................................................80
RMI..........................................................................................................................................80
Credentials management..................................................................................................................80
SSL certificates...........................................................................................................................80
Certificate sharing......................................................................................................................80
SSH keys...................................................................................................................................80
Passwords..................................................................................................................................80
Browser..........................................................................................................................................81
SSL...........................................................................................................................................81
Cookies.....................................................................................................................................81
Passwords..................................................................................................................................81
Password warnings.....................................................................................................................81
Browser session..........................................................................................................................81
Internet Explorer zones................................................................................................................82
System link format.......................................................................................................................82
Operating-system dependencies.........................................................................................................82
User accounts and authentication.................................................................................................82
File system.................................................................................................................................82
Background processes.................................................................................................................83
Windows Cygwin.......................................................................................................................83
Table of Contents 5