Understanding HP SIM 5.1 and 5.2 security (481362-003, January 2009)

Understanding HP SIM 5.1 and 5.2 security
Overview............................................................................................................................................ 3
Architecture overview........................................................................................................................... 3
Communication protocols ..................................................................................................................... 3
Simple Network Management Protocol (SNMP) ................................................................................... 3
Hyper Text Transfer Protocol (HTTP).................................................................................................... 3
Web-Based Enterprise Management (WBEM)...................................................................................... 3
Desktop Management Interface (DMI)................................................................................................. 4
Remote Method Invocation (RMI)........................................................................................................ 4
Remote Wake-Up............................................................................................................................. 4
Internet Control Message Protocol (ICMP) ........................................................................................... 4
Lightweight Directory Access Protocol (LDAP)....................................................................................... 4
Simple Object Access Protocol (SOAP) ............................................................................................... 4
Securing communication....................................................................................................................... 4
Secure Sockets Layer (SSL) ................................................................................................................ 4
Secure Shell (SSH)............................................................................................................................ 4
HTTPS............................................................................................................................................. 5
Secure Task Execution and Single Login.............................................................................................. 5
Distributed Task Facility .................................................................................................................... 5
WBEM............................................................................................................................................ 5
LDAP .............................................................................................................................................. 5
RMI ................................................................................................................................................ 6
Credential management ....................................................................................................................... 6
SSL certificates................................................................................................................................. 6
Certificate sharing............................................................................................................................ 6
SSH keys ........................................................................................................................................ 6
Passwords....................................................................................................................................... 6
Configuring managed systems............................................................................................................... 7
Manage Communications ................................................................................................................. 7
Agent installation ............................................................................................................................. 7
Agent configuration.......................................................................................................................... 7
Authorizations ................................................................................................................................. 7

Summary of content (20 pages)