
passwords. Any user with access to devices and conguration features has delegated access to the Credential
Store.
Credentials Needed
When HP Web Jetadmin, during an action such as device conguration, encounters a device with a credential
such as SNMP Set Community Name, it follows a specic sequence. Here is a simplied example showing how
HP Web Jetadmin attempts to resolve a credential:
●
HP Web Jetadmin checks the Credential Store for a credential.
●
If a credential exists, HP Web Jetadmin attempts the conguration using the credential value.
If a credential does not exist, HP Web Jetadmin checks Global Credentials.
●
If the conguration is successful, the credential check is resolved and complete.
If it fails, HP Web Jetadmin checks Global Credentials.
During a user-attended conguration session, HP Web Jetadmin prompts for credentials. If the user does not
supply the credential or the session is not live, the device is agged as Credentials Required and listed in the
Credentials Required column that can be enabled in any device list (Columns for Device Lists on page 106). You
can right-click the device and add the needed credential to the system in order to resolve this state.
HP Jetdirect Device Password
HP Web Jetadmin enables device security by providing management over appropriate, device-based security
settings. The HP Jetdirect password that was used by HP Web Jetadmin in the past is a software security
solution and not a device-based security solution. That is, the password itself had to be recognized and
authenticated by earlier revisions of HP Web Jetadmin software. Other applications did not recognize this
password and did not force users to prove knowledge of the password.
As security features have become more sophisticated and device based security has improved, HP Web Jetadmin
developers have opted out of using the HP Jetdirect device password as a protective mechanism for device
authentication. Instead, HP recommends that you choose one of the following two recommendations providing
device security:
●
SNMP Set Community Name: Devices will not allow an SNMP Set from any application without the Set
Community Name correctly embedded in the SNMP packet. If the Set name in the packet is “public” and the
Set name on the device is “George”, the device will not accept or acknowledge the packet. Set Community
Names traverse the network in clear text and, therefore, can be “snied” or viewed by eavesdroppers. In
most environments, security provided a Set Community Name may provide adequate security.
●
SNMPv3: Devices congured via SNMPv3 oer signicant security benets. First, SNMPv3 congures a user
account and two pass-phrases onto the device that the user (or application) must authenticate. This blocks
unauthorized management of devices, and the account/pass-phrase details do not traverse the network in
clear text which makes it dicult for eavesdroppers to learn the “secrets”. Second, the communication
between the management application and the device is encrypted using the SNMP credentials so
information about the device is protected. SNMPv3 is recommended in security-sensitive environments.
Restricting Conguration by Device Group
Within the model of device credential delegation, restriction to specic device conguration can be further
dened in User Security using the Restriction type Groups (Restrict Roles to Device Groups on page 281).
54 Chapter 2 Introduction to HP Web Jetadmin ENWW
Komentáře k této Příručce