Deleting trusted certificates, Requiring trusted certificates – HP Systems Insight Manager User Manual

Page 167

Advertising
background image

Related procedures

Trusted certificates

Importing trusted certificates

Deleting trusted certificates

Related topics

Trusted certificates

Setting up trust relationships

Server certificates

Networking and security

Installing OpenSSH

Managing SSH keys

Deleting trusted certificates

Delete

certificates

from the Trusted System Certificates List to remove them from the HP Systems Insight

Manager (HP SIM) keystore.

CAUTION:

The delete process is irreversible. Use this feature with caution!

To delete certificates from the Trusted System Certificates List:

1.

Select Options

SecurityCertificatesTrusted Certificates.

2.

Select the certificates to be deleted.

3.

Click Delete. A dialog box appears.

4.

Click Yes to delete the certificates, or click Cancel to abort the delete process and return to the Trusted
System Certificates

page.

The certificates are deleted from the Trusted System Certificates List.

Related procedures

Importing trusted certificates

Exporting trusted certificates

Requiring trusted certificates

Related topics

Trusted certificates

Server certificates

Networking and security

Installing OpenSSH

Managing SSH keys

Requiring trusted certificates

Trusted system certificates are certificates that represent managed systems. Enabling the Trusted System
Certificate

option enables HP Systems Insight Manager (HP SIM) to authenticate the remote managed system.

For ease of use, this option is disabled; this is the typical scenario and maintains a high level of security.
For maximum security, this option should be enabled, which requires some extra configuration.

If Require is enabled, when HP SIM attempts to make a Secure Sockets Layer (SSL) connection to a managed
system, a certificate representing that system must be found in the HP SIM keystore or the SSL connection
fails, and the attempted operation fails as well. The certificate representing the system can be the system's
SSL system certificate or the Certificate Authority (CA) level certificate that was used to sign the system's
certificate. For large numbers of systems, having a handful of CA level certificates sign all the system certificates

Trusted certificates 167

Advertising