Page tree

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Secure connectors are always preferred to insecure connectors.
For example, if a device is available over both Telnet and SSH, SSH will be used.

- Detect credentials

Credential discovery works differently depending if the device is set to "Discover" credentials, or has "Bound" credentials.

If credential discovery enabled:
  All credentials configured in the 'Credentials' settings are checked against the device.
  Credentials are checked against the device in random order.

  Whichever credentials work on the device first will be used for any future operations with this device.

When credentials bound to device:
  Only bound credentials are tested against the device
  If bound credentials do not work, the job fails

- Detect device vendor and model

...