<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Certificate based authentication in UM 7.3, 9.4 in Active IQ Unified Manager Discussions</title>
    <link>https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/Certificate-based-authentication-in-UM-7-3-9-4/m-p/142848#M26106</link>
    <description>&lt;P&gt;Hi. you mean OCUM&amp;nbsp;access to the cluster with a Client Cert and not a user? if so, i don't think it's possible.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also from sec point. i think that ther's much&amp;nbsp;different if the client cert saved in OCUM getting stolen or a password/api key saved in OCUM getting stolen.&lt;/P&gt;
&lt;P&gt;Client cert is mainly useful when you have a token device or a smart card to protect the key. if the cert is unprotected - it's not much&amp;nbsp;different from an unprotected password (well -after a re-think: at least for common attacks. as the private key will also not go over the wire as password do on the authentication. but that goes&amp;nbsp;encrypted channel anyway)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Gidi.&lt;/P&gt;</description>
    <pubDate>Fri, 21 Sep 2018 01:27:12 GMT</pubDate>
    <dc:creator>GidonMarcus</dc:creator>
    <dc:date>2018-09-21T01:27:12Z</dc:date>
    <item>
      <title>Certificate based authentication in UM 7.3, 9.4</title>
      <link>https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/Certificate-based-authentication-in-UM-7-3-9-4/m-p/142845#M26104</link>
      <description>&lt;P&gt;need advise on how to implement this solution, rather than relying having to create local a/c in nas used for adding it to UM for datasource acquisition.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2025 13:17:43 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/Certificate-based-authentication-in-UM-7-3-9-4/m-p/142845#M26104</guid>
      <dc:creator>Cavin</dc:creator>
      <dc:date>2025-06-04T13:17:43Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate based authentication in UM 7.3, 9.4</title>
      <link>https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/Certificate-based-authentication-in-UM-7-3-9-4/m-p/142848#M26106</link>
      <description>&lt;P&gt;Hi. you mean OCUM&amp;nbsp;access to the cluster with a Client Cert and not a user? if so, i don't think it's possible.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also from sec point. i think that ther's much&amp;nbsp;different if the client cert saved in OCUM getting stolen or a password/api key saved in OCUM getting stolen.&lt;/P&gt;
&lt;P&gt;Client cert is mainly useful when you have a token device or a smart card to protect the key. if the cert is unprotected - it's not much&amp;nbsp;different from an unprotected password (well -after a re-think: at least for common attacks. as the private key will also not go over the wire as password do on the authentication. but that goes&amp;nbsp;encrypted channel anyway)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Gidi.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Sep 2018 01:27:12 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/Certificate-based-authentication-in-UM-7-3-9-4/m-p/142848#M26106</guid>
      <dc:creator>GidonMarcus</dc:creator>
      <dc:date>2018-09-21T01:27:12Z</dc:date>
    </item>
  </channel>
</rss>

