1 |
In your cartridge project, open the agent-definition.xml file for editing. |
3 |
4 |
Locate the <jvm-config> element definition. |
5 |
Wrap it into a <runtime> element using the following block of code: |
IMPORTANT: There is now a typed element for setting VM memory sizes. Any -Xms or -Xmx values set as <jvm-arg> in the prior schema must be transferred to the new <jvm-memory> element. |
6 |
2 |
• |
Challenge Response: Uses one or more challenge and response pairs to grant access without requiring any interaction in the browser interface. The answers are sent by the agent as part of the agent configuration. |
• |
Domain, User Name, and Password (Windows): Requires a user name and password to access a monitored resource. The domain name is optional. |
IMPORTANT: When specifying a domain name in this credential type, a fully qualified domain name is required. Failing to use a fully qualified domain name may prevent the Agent Manager from establishing a connection to a remote monitored resource. For example, if the full domain name is prod.example.com, use prod.example.com as the domain name instead of just prod, when configuring the credential. |
• |
DSA Key: Uses the Digital Signature Algorithm (DSA) Key for authentication. |
• |
RSA Key: Uses the RSA (Rivest, Shamir, and Adleman) Key for authentication. |
• |
Use Client’s Login At Connection Time: Uses the currently logged in user’s account to access secured resources. This is not the user currently logged into the Management Server, but the user under which the credential client is running. For example, a credential provided to an Agent Manager instance launched by a user on a remote machine, causes the connection to the secured resource to be made using this user’s identity. |
• |
User Name: Requires a user name to access a monitored resource. |
• |
User Name and Password: Requires a user name and password to access a monitored resource. |
© 2025 Quest Software Inc. ALL RIGHTS RESERVED. Terms of Use Privacy Cookie Preference Center