Skip to main content

Credentials

The credentials page is accessible from the Settings menu. This is where credentials used to connect to remote devices and services are created and managed.

The page is a list of grids containing credentials for different types of device, protocol or service. While some grids may only be visible if certain licensees or options are in place, this is the full list:

  • ITSM System Credentials
  • Cloud System Credentials
  • SSH / Telnet Credentials
  • Splunk Credentials
  • ESXi / vCenter Credentials
  • Database Credentials

Each grid has a button to create a new credential. The far right column contains buttons to edit and delete specific credentials.

ITSM System Credentials

These credentials are used to connect to an ITSM and discover devices to scan from the ITSM's configuration item catalog.

ITSM System Credentials

Cloud System Credentials

These credentials are used by the Cloud Tracker feature to track changes to cloud platform configuration.

Cloud System Credentials

SSH / Telnet Credentials

These credentials are used for agentless connections to devices (Linux, switches, routers, etc.) via SSH or Telnet. Credentials for Windows agentless connections are also stored here.

SSH Telnet Credentials

Splunk Credentials

These credentials are used to connect to the API of a Splunk instance and pull specific logs into Change Tracker as change events.

Splunk Credentials

ESXi / vCenter Credentials

These credentials are used to connect to ESXi devices or to connect to a vSphere and discover all of it's ESXi nodes.

EXsi Credentials

Database Credentials

These credentials are used by database compliance reports to connect directly to a database instance.

Database Credentials

Note: v1 database credentials are now deprecated and only maintained for backward compatibility. v2 database credentials should be used for any new connections.

When adding a v1 database credential a database connection string was required. This required a separate database credential for each database instance to monitor even if the username and password were the same! To address this, v2 database credentials only contain username and password.

Connection strings are now required when defining a proxied device for a database connection. This allows you to use the same database credential for multiple database connections. It also means there is only one credential to update when its password expires.

For more information on v2 database credentials, see the v8.1 release notes