Your browser does not allow storing cookies. We recommend enabling them.

PreviousNextUp[Front page] [Index]

Editing Entities

The Entity page can be reached in many ways. You can search for entities based on their creation time or by some indexed words given in the entity attributes. To do the search, select the Find Entities option from the main menu.

Searches can also be made from the certification request update page. Some log entries have an associated entity which can be viewed. An entity associated with a certificate can be viewed from the certificate page.

The Entity page looks almost the same as the entity creation page. The only difference is the addition of Pre-shared keys and some different buttons in the bottom of the page.

Figure : The Entity page

Clicking the Commit Changes button will update the Database with the new name, status and attribute values that have been set by the operator. Changes in pre-shared keys are updated on their own and are unaffected by this button.

Clicking the View Log button fetches the recent log entries related to this entity and displays them. The View Requests button searches the Database for all pending certification requests that are marked to this entity either automatically by some policy mapping or manually by the operator. The View Certificates option shows all active certificates that belong to this entity. The Search button shows a generic find page with the current entity automatically bound.

The Copy Entity option makes a new copy of this entity. Only attributes, type and name are copied as shared secrets are naturally entity-specific.

PreviousNextUp[Front page] [Index]


Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more