Application of Credentials

<< Click to Display Table of Contents >>

RayVentory Scan Engine > 12.6 u4 > User Guide > Advanced Topics 

Application of Credentials

RayVentory Scan Engine differentiates between five different credential types:

 

Windows

SSH

Oracle DB

SNMP

vSphere

 

Windows and SSH Credentials

The types Windows and SSH are used for OS / Device inventory and during Discovery for discovering / probing Oracle databases. The remote execution based inventory methods for Oracle use these credentials too, in order to find evidence for Oracle instances in the host file system and services and for authentication to the host system.

 

Oracle DB Credentials

The type Oracle DB is used for authentication against Oracle databases for creating the Oracle inventory.

 

SNMP Credentials

The type SNMP is used for selecting an SNMP community or authentication by SNMP v3.

 

vSphere Credentials

The type vSphere is used for authentication against the VMware management API for the creation of inventories of vSphere / ESX virtualization hosts.

 

In general, the application of credentials to a target system / service happens in the order they appear in the credentials list. If certain credentials have been set for a device / service then these are tried first, before other credentials are tried. On a successful inventory, RayVentory Scan Engine remembers which credentials have been used for a device or service and tries these first the next time an inventory is run.

 

Credentials may be restricted to be applied to certain devices. To restrict credentials to a specific hostname enter that hostname or IP address into the field Target name pattern. This field supports Regular Expressions.

 

warning1

WARNING

Whilst the idea of creating a list of credentials to try on each host may sound handy (especially if you are not certain which credentials actually belong to a certain device / service), keep in mind that such brute-forcing of credentials may trigger alarms in your security and network monitoring solution. In case of an Oracle database you may even lock a user as by default, as three failed authentication attempts in a row will lock the user / login that has been used. It is highly recommended to use as few generic credentials as possible, by either selecting concrete credentials for devices or setting up filters to limit their application.