HP

HP Systems Insight Manager Technical Reference Guide

English
  Networking and Security  |  About Secure Task Execution   

About Secure Task Execution

»Table of Contents
»Index
»Notices
»Introduction
»Product Overview
»Getting Started
»Discovery and Identification
»Users and Authorizations
»Networking and Security
»About Login
About Secure Task Execution
»Configuring the System Link
»Configuring Login Events
»Configuring Browser Timeout Options
»Server Certificates
»Trusted Certificates
»Monitoring Systems, Clusters, and Events
»Storage Integration
»Managing with Tasks
»Tools that Extend Management
»Partner Applications
»Reporting
»Administering Systems and Events
»Troubleshooting
»Reference Information
»Printable version
»Glossary
»Using Help
» Related Topics

HP Systems Insight Manager (HP SIM) tasks that cause state or configuration changes on managed systems use Secure Task Execution (STE) to issue their commands to the system. STE enables an HP SIM system to securely request execution of a task from a managed system. It ensures that the user requesting the task has the appropriate rights to perform the task. The request includes a digital signature to uniquely identify the HP SIM system making the request. Secure Sockets Layer (SSL) is then used to encrypt the request and protect the data from alteration or eavesdropping. Refer to Trusted Certificates - Setting Up Trust Relationships for more information.

STE requires a Trusted Management Servers List at each managed system to ensure that only specified HP SIM systems can execute tasks on the system.

On the managed system, only Trust by Certificate ensures the request came from the specified HP SIM system. Other options, such as Trust by Name or Trust All, do not verify the digital signature of the HP SIM system and, therefore, cannot reliably verify the sender of the request.

Tasks using STE, such as Replicate Agent Settings and Install Software and Firmware, do not work against a Virtual Cluster System. However, these tasks work when executed directly against the physical systems of the cluster.

Related Topics

» Server Certificates - Exporting a Server Certificate
» Trusted Certificates - Setting Up Trust Relationships
» Trusted Certificates - Requiring Trusted Certificates
» Server Certificates - Creating a Server Certificate
» Tools that Extend Management - Installing OpenSSH
» Administering Systems and Events - Managing SSH Keys