Configuring the access list

This topic describes the access details that you require, depending on your configuration.

To configure the access list, complete the following steps:

  1. Select ComputerSystem as the Component Type.
  2. Specify the access information (user name and password) that TADDM must use for either SSH key-based authentication or SSH login-based authentication to the target computer system.

Typically, an account with non-root privilege can be used. The commands that are used by the Tru64 computer system sensor carrying out the discovery can require privilege escalation. Typically, this escalation is done by setting the file access permissions using the sudo command.

For more information, see Commands that might require elevated privilege.