Performing optional configuration, Authentication – HP Remote Device Access Software User Manual
Page 36

Access Control
Description
User
The name of the user for which access is or is not granted.
Access Allowed
This check box indicates if access is allowed or denied. A selected check box
indicates access is allowed. A clear check box indicates access is denied.
Action
Click
to delete a user account from the vCAS.
Table 4.8 Permitted Shell Logins
Performing Optional Configuration
From the Tools menu, you can configure the following options:
l
Authentication
l
Email Alerts
l
Licensing
l
Preferences
l
Remote Logging
l
Setup
l
Software Updates
Authentication
Incoming connections are authenticated using X.509 certificates. Some of these certificates are revoked
before they expire. The Authentication dialog box allows administrators to select the way the vCAS
checks the setting of the X.509 certificates. There are three options for certificate revocation checking:
OCSP, CRL, and No Check.
Figure 4.8 Authentication
HP Remote Device Access 8.1: vCAS User Guide
Page 36 of 65
Chapter 4: Managing your vCAS