Using privlege control software with agentless discovery of UNIX hosts

Veritas Operations Manager requires a user account to perform agentless discovery of a remote UNIX host. The minimum requirement is a non-root user account. However, there are a few instances where Veritas Operations Manager requires a root user account.

See Commands that require root access for agentless discovery of UNIX hosts.

To discover that information, you can configure Veritas Operations Manager to use one of the following:

Veritas Operations Manager supports the following privilege control software with agentless discovery:

Table: Using privilege control software with agentless discovery of UNIX hosts identifies how you can use privilege control software with agentless discovery.

Table: Using privilege control software with agentless discovery of UNIX hosts

Step

Action

1

Install the privilege control software on the remote host that you want to discover.

2

Modify the configuration file for the privilege control software as follows:

  • Add the user name that you want to use for agentless discovery.

  • Add the commands that you want to allow the user to run.

    See Commands that require root access for agentless discovery of UNIX hosts.

  • Ensure that the software does not require a TTY session for commands to succeed.

  • Ensure that the software does not require a password when running a command.

  • Ensure that the user has the privilege to kill the commands that are initiated with the privilege control software. Symantec recommends this privilege because it gives the non-root user the ability to kill any commands that hang when run through the privilege control software.

3

Configure agentless discovery of hosts.

See Adding the managed hosts to Management Server using the Web Console.