Owner manual

Managing with tasks........................................................................................................................57
Viewing results................................................................................................................................58
Example - Device ping......................................................................................................................58
IV Systems Insight Manager advanced features................................................59
16 Collections in Systems Insight Manager..................................................60
Collections in Systems Insight Manager...............................................................................................60
Types of collections.....................................................................................................................61
Other customization features........................................................................................................62
17 Systems Insight Manager custom tools....................................................66
General concepts............................................................................................................................66
Tool types..................................................................................................................................66
Environment variables for custom tools...........................................................................................67
Custom tool menu placement........................................................................................................68
Custom tool URL format...............................................................................................................69
Creating custom tools through the GUI................................................................................................69
New.........................................................................................................................................70
Edit...........................................................................................................................................70
View tool definition.....................................................................................................................70
Run Now/Schedule....................................................................................................................70
Delete.......................................................................................................................................70
Creating custom tools through the Systems Insight Manager CLI.............................................................70
Creating a custom SSA tool..........................................................................................................70
Example Web launch tool............................................................................................................73
Example MSA tool......................................................................................................................73
Example Enabling Remote Desktop tool.........................................................................................74
Adding a TDEF to Systems Insight Manager...................................................................................75
Removing a TDEF from Systems Insight Manager.............................................................................75
Modifying a TDEF.......................................................................................................................76
18 Understanding Systems Insight Manager security.....................................77
Securing communication...................................................................................................................77
Secure Sockets Layer (SSL)...........................................................................................................77
Secure Shell (SSH)......................................................................................................................77
Hyper Text Transfer Protocol Secure (HTTPS)...................................................................................77
Secure Task Execution (STE) and Single Sign-On (SSO)....................................................................77
Distributed Task Facility (DTF).......................................................................................................77
WBEM......................................................................................................................................78
LDAP.........................................................................................................................................78
RMI..........................................................................................................................................78
Credentials management..................................................................................................................78
SSL certificates...........................................................................................................................78
Certificate sharing......................................................................................................................78
SSH keys...................................................................................................................................78
Passwords..................................................................................................................................78
Browser..........................................................................................................................................79
SSL...........................................................................................................................................79
Cookies.....................................................................................................................................79
Passwords..................................................................................................................................79
Password warnings.....................................................................................................................79
Browser session..........................................................................................................................79
Internet Explorer zones................................................................................................................80
System link format.......................................................................................................................80
Operating-system dependencies.........................................................................................................80
User accounts and authentication.................................................................................................80
File system.................................................................................................................................80
Background processes.................................................................................................................81
Windows Cygwin.......................................................................................................................81
HP-UX and Linux.........................................................................................................................81
Table of Contents 5