Credentials
On this page
Introduction
Credentials can be set up once in and used in both Discovery and process integrations. Using credentials:
- You can ensure the quality of the information you receive from Discovery scans.
- Administrators can set up and use credentials for process integrations based on authentication method.
See Available authentication protocol types and required information.
Navigation
ITSM customers | ESM customers |
---|---|
Setup > Account > Credentials | IT Service Provider > Setup > Account > Credentials |
Use Credentials for Discovery
SolarWinds recommends the use of credentials for Discovery. With credentials, you can collect the most information possible.
Credentials are used in subnet and router scans. For integration scans, such as SCCM, vCenter, AWS, or SolarWinds Platform, see Connections. When you don't use credentials, the quality of the information you receive from a scan is dependent on what is available with no credentials. For example, if there’s no unique identifier the device could be dropped. See Credentials for Discovery.
Use Credentials for Process Integrations
Process integration allows you to integrate with third-party applications to use a target for commands within your workflows. When you set up integration you can reuse it for many workflows.
Adding a new process integration is easy. When finished, it becomes an available source to connect your workflows when building service catalog items, change catalog items, or runbooks.
See Process integrations.
All Credentials index page
The All Credentials index page contains these columns:
- Name (click to open credential details and edit): The name assigned to the credential
- Where used: The number of connections or integrations using the credential
- Type: The credential type; for example, SNMP, SSH, OAuth2, or another type
- Last update: The most recent date and time the credential was updated
The table below explains the columns on the All Credentials index page.
Column |
Description |
---|---|
NAME |
It is important to select a meaningful name that assists you in defining your environment. Click on the name to modify and add a description. You can also update the credentials here. The required details are dependent on the Credential Type.
|
WHERE USED |
Describes the number of subnets and the number of network devices associated to each subnet. For process integrations, it specifies the number of integrations associated with the credential. |
TYPE |
The selected type of the created credential. |
LAST UPDATE |
Provides the date and time of the last change. |
ACTIONS |
When hovering over the row, a trash bin displays. You may delete the credential as long as it is not currently in use. |
You can customize the All Credentials index page to a view that best meets your needs. See List view for more information.
Create a new credentials set
-
Navigate to Setup > Account > Credentials.
-
From the All Credentials index, click the Add icon, and select the appropriate authentication method from the dropdown list.
-
Enter the required* information, which varies based on the selected authentication protocol method/type.
See Connections or Process integrations.
Delete credentials
A credentials set can only be deleted when not in use.
Available authentication protocol types and required information
Authentication Method/Type | Required information | Optional information |
SNMP v1/v2c Used to access network devices like routers, printers, and switches |
|
|
SNMPv3 Used for scanning network devices like, printers, routers, and switches |
|
|
SSH Key Used to authenticate users and hosts on the Secure Shell (SSH) network protocol |
|
|
User and Password A set of unique identifiers that allow a user to log in to a digital system Used for Process integrations |
|
|
Used to grant third-party applications access to a user's protected resources without sharing the user's long-term credentials. See RFC 6749. Used for Process integrations |
|
|
SolarWinds Service Desk Web Token Temporary keys that verify a user's identity and allow them to access a website or application Used for Process integrations |
|
|
Bearer Token Used to grant access to a resource or service in authentication protocols like OAuth 2.0 Used for Process integrations |
|
|