User Documentation
  • Product Information
    • Overview
    • Architecture
    • Security
    • Key Features
    • Supported Systems
    • Comparison
  • Installation
    • Download VirtualMetric
    • Install a VirtualMetric Server
    • Activate Product
    • Update From Previous Versions
    • Uninstall VirtualMetric
  • Releases
    • Version 8.0.3
  • Server Pre-Configuration
    • Windows
    • VMware
    • Linux
    • Bare Metal Hardware
  • Settings
    • Users
      • User Operations
        • Add New User
        • Edit User
        • Device Permissions
        • Login as Other User
        • Remove User
      • User Group Operations
        • Add New User Group
        • Assign Member
        • Device Permission
        • Edit User Group
        • Remove User Group
      • API Users Operations
        • Add New API User
        • Edit API User
        • Device Permission
        • Remove API User
      • Organization Operations
        • Add New Organization
        • Edit Organization
        • Device Permission
        • Login as Other Organization
        • Remove Organization
      • Credential Store
        • Add New Credential Store
        • Edit Credential Store
        • Remove Credential Store
      • Group Based AD Authentication
    • Devices
      • Server Operations
        • Add New Server
        • Assign Module
        • Edit Server
        • Remove Server
        • Restore Server
        • Connectivity Issues
        • Bulk Update
      • Cluster Operations
        • Add New Cluster
        • Assign Module
        • Sync a Cluster
        • Edit Cluster
        • Remove Cluster
        • Connectivity Issues
        • Bulk Update
      • Workstation Operations
        • Add New Workstation
        • Edit Workstation
        • Remove Workstation
      • Manager Operations
        • Add New Manager
        • Assign Module
        • Sync Manager
        • Edit Manager
        • Remove Manager
        • Connectivity Issues
        • Bulk Update
      • Network Devices Operations
        • Add Network Device
        • Edit Network Device
        • Remove Network Device
        • Connectivity Issues
        • Bulk Update
      • Trigger Operations
        • Add New Trigger
        • Assign Server
        • Edit Trigger
        • Change API User
        • Change Service User
        • Remove Trigger
        • Enable Debug
      • Device Group Operations
        • Add New Device Group
        • Assign Member
        • Edit Device Group
        • Remove Device Group
      • Datacenter Operations
        • Add New Datacenter
        • Assign Member
        • Edit Datacenter
        • Remove Datacenter
      • Permission Operations
        • Add/Remove Permission
    • Listeners
      • Listener Operations
        • Add a New Listener
          • Add a Syslog Listener
          • Add a Flow Endpoints
          • Add a eStreamer
          • Add a TFTP Listener
          • Add a TCP Listener
          • Add a UDP Listener
          • Add a HTTP Listener
          • Add a SMTP Listener
          • Add a SNMP Trap Listener
          • Add a Redis Consumer
          • Add a Kafka Consumer
          • Add a RabbitMQ Consumer
          • Add a NATS Consumer
        • Edit Listener
        • Remove Listener
    • Services
      • Location Operations
        • Add new Location
        • Edit Location
        • Remove Location
      • Web Sites Operations
        • Add new Website
        • Assign Location
        • Edit Web Sites
        • Remove Web Sites
      • DNS Operations
        • Add new DNS
        • Edit DNS
        • Remove DNS
      • ICMP Operations
        • Add new ICMP
        • Edit ICMP
        • Remove ICMP
      • IPAM Operations
        • Add new IPAM
        • Edit IPAM
        • Remove IPAM
      • TCP Operations
        • Add new TCP
        • Edit TCP
        • Remove TCP
      • Database Operations
        • Add new Database
        • Edit Database
        • Remove Database
    • Notifications
      • Rules Operations
        • Add new Rules
        • Edit Rule
        • Adding Dependency
        • Filtering Rules
        • Assign Action
        • Remove Rule
      • Knowledge Base Operations
        • Add new Knowledge Base
        • Edit Knowledge Base
        • Remove Knowledge Base
      • Action Operations
        • Add new Action
        • Testing Action
        • Edit Action
        • Remove Action
      • Scheduled Report Operation
        • Edit Scheduled Report
        • Remove Scheduled Report
      • STMP Settings
      • SMS Settings
    • Collectors
      • Definitions Operations
      • Module Defaults Operations
      • Device Bindings Operations
    • Logs
      • Definitions Operations
        • Understand Definition Fields
        • Edit Definition
        • Bulk Update
        • Reset Definition
      • Custom Definition Operations
        • Add Custom Definition
        • Edit Custom Definition
        • Remove Custom Definition
      • Module Defaults
        • Assign Definition
        • Reset Module Defaults
      • Device Bindings
        • Assign Definition
        • Reset Device Bindings
    • Statistics
      • Logging Types
        • Understanding Logging Types
        • Edit Logging Type
        • Reset Logging Type
      • System Counters
        • Understanding System Counter
        • Edit System Counter
        • Reset System Counter
      • Custom Counters
        • Understanding Custom Counter
        • Edit Custom Counter
        • Reset Custom Counter
    • Systems
      • System Logs
      • System Health
      • Advanced Settings
    • Azure Active Directory Integration
  • Dashboard
    • Main Page
    • Login
    • Layout and Common Functions
    • Calculation of Recommendations
    • Add New Widget
    • Edit Widget
    • Charts
    • White Labeling
  • Devices
    • Layout and Common Functions
  • Analytics
    • Layout and Common Functions
  • Modules and Audit
    • VirtualMetric Modules
      • Bare Metal
      • Microsoft Hyper-V
      • VMware
      • Microsoft IIS
      • Microsoft SQL
      • Microsoft Storage Spaces
      • Active Directory User Permissions
    • Audit Configuration
Powered by GitBook
On this page
  • Basic
  • SSH Key Based
  • Cyberark
  • SNMPv2
  • SNMPv3
  • API Key
  • Bearer Token
  • HMAC
  • HTTP Header
  1. Settings
  2. Users
  3. Credential Store

Add New Credential Store

PreviousCredential StoreNextEdit Credential Store

Last updated 1 year ago

1. Click to Users Groups on the left pane to navigate to the User Settings.

2. On User Management screen, click Add (+) button on the right top section.

3. Select the action type and fill the other fields, then click Submit

Select an Action Type from the field. The Action Type refers to a different method or mechanism for authentication, and each has its own set of actions or operations associated with it. You can see an array of Action Type such as Basic, SSH key based, Cyberark, SNMPv2, SNMPv3, API Key, Bearer Token, HMAC, HTTP Header, etc. Let's see how we can create each of these Action Type.

Basic

Select Basic option from the dropdown menu. You get the following screen:

Refer to the following table to understand the fields in the above screen.

Fields
Description

Action Type

This is the basic authentication method which involves username and password.

Visibility

To provide visibility to either your own organization or all the other organizations. The options are:

1) My Organizations

2) All Organizations

Friendly Name

Any name which user wants to use.

Description

Provide a description about the Credential Store

Username

Add an appropriate username as you like

Password

Add a password

SSH Key Based

Refer to the following table to understand the fields in the above screen.

Fields
Description

Action Type

SSH key-based authentication is a method used for securely connecting to remote servers and services over SSH (Secure Shell) without the need to enter a password.

Visibility

To provide visibility to either your own organization or all the other organizations. The options are:

1) My Organizations

2) All Organizations

Friendly Name

Any name which user wants to use.

Description

Provide a description about the Credential Store

Username

Add an appropriate username as you like

SSH Private Key

Add a password which should be the OpenSSH key in PEM format

Enable Passphrase

Select the checkbox, you will get an additional field to add a Passphrase of your choice.

Cyberark

Refer to the following table to understand the fields in the above screen.

Fields
Description

Action Type

Cyberark is an authentication method which involves storing, retrieving, rotating, and managing privileged credentials (e.g., usernames and passwords) for sensitive systems and accounts. It also includes monitoring and auditing access to privileged accounts.

Visibility

To provide visibility to either your own organization or all the other organizations. The options are:

1) My Organizations

2) All Organizations

Friendly Name

Any name which user wants to use.

Description

Provide a description about the Credential Store

Name

Name of an object or resource which typically refers to a specific identifier used to uniquely designate items such as encryption keys, database servers, etc.

Application

This term denotes the application or system component linked to the associated resource. Particularly in a complex IAM (Identity and Access Management) enviornment where multiple applications or systems are utilized, it becomes vital to specify the affiliation of each resource to a particular application. This allows for more granular management of authorization and permissions.

Safe

Safe represents a secure repository or vault where privileged credentials, such as usernames and passwords, SSH keys, and other sensitive information, are stored and managed

Folder

Folder serves as a way to organize and categorize objects within a Safe. Objects can include credentials, secrets, and other sensitive information.

Port

A specific endpoint for data exchange between two devices or applications within a network.

Object Name

This term typically refers to a specific resource or object within an application. It could be a file, folder, database table, or another entity within an application. Object names are used when creating access control lists or configuring authentication and authorization processes.

SNMPv2

Refer to the following table to understand the fields in the above screen.

Fields
Description

Action Type

This authentication method is used to monitor and manage networked devices, such as routers, switches, servers, and network printers.

Visibility

To provide visibility to either your own organization or all the other organizations. The options are:

1) My Organizations

2) All Organizations

Friendly Name

Any name which user wants to use.

Description

Provide a description about the Credential Store

Community String

The Community String is a basic form of authentication and access control used to manage and monitor network devices. It acts like a password or a shared secret that SNMP agents and managers use to authenticate and authorize SNMP requests.

Example: public, private

SNMPv3

Refer to the following table to understand the fields in the above screen.

Fields
Description

Action Type

This authentication method is used to monitor and manage networked devices, such as routers, switches, servers, and network printers. It is an enhanced and more secure version of SNMP compared to its predecessors, SNMPv1 and SNMPv2c.

Visibility

To provide visibility to either your own organization or all the other organizations. The options are:

1) My Organizations

2) All Organizations

Friendly Name

Any name which user wants to use.

Description

Provide a description about the Credential Store

Authentication Protocol

The authentication protocol used for SNMPv3 includes MD5, SHA, SHA224, SHA256, SHA384, SHA512, etc.

Username

Add an appropriate username as you like

Password

Add a password

Privacy Protocol

The privacy protocols are used for encrypting SNMP payloads, protecting sensitive information from unauthorized access or eavesdropping. There are two primary privacy protocols in SNMPv3: DES and AES. You can also choose other options such as None, AES192, AES192C, AES256, AES256 from the dropdowns.

API Key

Refer to the following table to understand the fields in the above screen.

Action Type

This is another authentication method used to authenticate and authorize access to an API.

Visibility

To provide visibility to either your own organization or all the other organizations. The options are:

1) My Organizations

2) All Organizations

Friendly Name

Any name which user wants to use.

Description

Provide a description about the Credential Store

Key

Unique identifier used to connect to, or perform, an API call.

Value

Refers to the actual alphanumeric code that makes up the API key

Add To

There are 2 options:

Header and Query Params. You can add the API Key to the API Header or in the Query Parameters as needed.

Bearer Token

Refer to the following table to understand the fields in the above screen.

Fields
Description

Action Type

The Bearer Token authentication method is a widely used approach for securing APIs and web services.

Visibility

To provide visibility to either your own organization or all the other organizations. The options are:

1) My Organizations

2) All Organizations

Friendly Name

Any name which user wants to use.

Description

Provide a description about the Credential Store

Token

The token that is used for authentication.

HMAC

Refer to the following table to understand the fields in the above screen.

Fields
Description

Action Type

HMAC is a specific type of message authentication code (MAC) that uses a cryptographic hash function along with a secret key to create a fixed-size hash value (digest) from the input data. HMAC is commonly used in various security protocols and applications, including securing network communications (e.g., in VPNs and IPsec), web authentication (e.g., OAuth), message authentication in cryptography, and more.

Visibility

To provide visibility to either your own organization or all the other organizations. The options are:

1) My Organizations

2) All Organizations

Friendly Name

Any name which user wants to use.

Description

Provide a description about the Credential Store

Http header

HTTP headers contain additional information about the request or response, facilitating communication between a client and a server by conveying details like content type, caching directives, authentication credentials, and more.

Key

In HAMC, key is a secret cryptographic key that is used to generate the authentication tag and to verify the authenticity and integrity of a message or data.

Type

There are different types HAMC to select from the dropdowns:

SHA1, SHA256, SHA512

Prefix

Refers to a sequence of characters added to the beginning of a string, variable, or identifier.

HTTP Header

Refer to the following table to understand the fields in the above screen.

Fields
Description

Action Type

This is another authentication method which is included in the HTTP message as key-value pairs and is transmitted as part of the HTTP protocol.

Visibility

To provide visibility to either your own organization or all the other organizations. The options are:

1) My Organizations

2) All Organizations

Friendly Name

Any name which user wants to use.

Description

Provide a description about the Credential Store

Header

Name of secret

Value

Value (password of secret)