![]() Resource mappings identify the parts of the monitored system that selected agents can access based on their credentials. A selected credential type dictates the type and structure of resource mappings associated with a credential. For example, some agents support the use of the Use Client’s Login At Connection Time and User Name and Password credential types, while others can only accept the Challenge Response or User Name types. ![]() The credential type depends on the agent that will use the credential to access the monitored resource. Storage Performance and Utilization Management.Information Archiving & Storage Management.Hybrid Active Directory Security and Governance.Starling Identity Analytics & Risk Intelligence. ![]()
0 Comments
Leave a Reply. |