Documentation forSolarWinds Service Desk

Credentials

On this page

Introduction

Credentials can be set up once in and used in both Discovery and process integrations. Using credentials:

  • You can ensure the quality of the information you receive from Discovery scans.
  • Administrators can set up and use credentials for process integrations based on authentication method.

See Available authentication protocol types and required information.

Navigation

ITSM customers ESM customers
Setup > Account > Credentials IT Service Provider > Setup > Account > Credentials

Use Credentials for Discovery

SolarWinds recommends the use of credentials for Discovery. With credentials, you can collect the most information possible.

Credentials are used in subnet and router scans. For integration scans, such as SCCM, vCenter, AWS, or SolarWinds Platform, see Connections. When you don't use credentials, the quality of the information you receive from a scan is dependent on what is available with no credentials. For example, if there’s no unique identifier the device could be dropped. See Credentials for Discovery.

Use Credentials for Process Integrations

Process integration allows you to integrate with third-party applications to use a target for commands within your workflows. When you set up integration you can reuse it for many workflows.

Adding a new process integration is easy. When finished, it becomes an available source to connect your workflows when building service catalog items, change catalog items, or runbooks.

See Process integrations.

All Credentials index page

The All Credentials index page contains these columns:

  • Name (click to open credential details and edit): The name assigned to the credential
  • Where used: The number of connections or integrations using the credential
  • Type: The credential type; for example, SNMP, SSH, OAuth2, or another type
  • Last update: The most recent date and time the credential was updated

The table below explains the columns on the All Credentials index page.

Column

Description

NAME

It is important to select a meaningful name that assists you in defining your environment. 

Click on the name to modify and add a description. You can also update the credentials here. The required details are dependent on the Credential Type. 

  • SNMPv3 requires a Username, Authentication Protocol, Authentication Key, Privacy Protocol, and Privacy Key

  • SSH Password only requires a Username and Password. 

WHERE USED

Describes the number of subnets and the number of network devices associated to each subnet. For process integrations, it specifies the number of integrations associated with the credential.

TYPE

The selected type of the created credential. 

LAST UPDATE

Provides the date and time of the last change.

ACTIONS

When hovering over the row, a trash bin displays. You may delete the credential as long as it is not currently in use. 

You can customize the All Credentials index page to a view that best meets your needs. See List view for more information.

Create a new credentials set

  1. Navigate to Setup > Account > Credentials.

  2. From the All Credentials index, click the Add icon, and select the appropriate authentication method from the dropdown list.

  3. Enter the required* information, which varies based on the selected authentication protocol method/type.

Credentials are not used unless they are associated with a connection or a process integration.

See Connections or Process integrations.

Delete credentials

A credentials set can only be deleted when not in use.

Available authentication protocol types and required information

Authentication Method/Type Required information Optional information

SNMP v1/v2c

Used to access network devices like routers, printers, and switches

  • Name
  • Community
  • Description

SNMPv3

Used for scanning network devices like, printers, routers, and switches

  • Name
  • Username
  • Authentication Key
  • Privacy Key
  • Description
  • Authentication Protocol (None, MD5, or SHA)
  • Privacy Protocol (None, DES, AES, or AES256)

 

SSH Key

Used to authenticate users and hosts on the Secure Shell (SSH) network protocol

  • Name
  • Username
  • SSH Private Key
  • Description

User and Password

A set of unique identifiers that allow a user to log in to a digital system

Used for Process integrations

  • Name
  • Username
  • Password
  • Description

OAuth 2.0

Used to grant third-party applications access to a user's protected resources without sharing the user's long-term credentials. See RFC 6749.

Used for Process integrations

  • Name
  • Authentication URL
  • Description
  • Update Token Path (Show button to view or edit the Token Path. Modifying this setting will affect your integration connection. Changes will only be applied after you save them.)
  • Additional Headers (You can add headers.)

SolarWinds Service Desk Web Token

Temporary keys that verify a user's identity and allow them to access a website or application

Used for Process integrations

  • Name
  • Token
  • Description
  • Additional Headers (Custom headers for your process integration API call.)

Bearer Token

Used to grant access to a resource or service in authentication protocols like OAuth 2.0

Used for Process integrations

  • Name
  • Token
  • Description
  • Additional Headers (Custom headers for your process integration API call.)

Related topics

Setup resources