Cisco Cisco Intelligent Automation for SAP 2.1 ユーザーガイド
3-12
Cisco TEO—Process Automation Guide for Automation for SAP HANA
OL-26889-01
Chapter 3 Getting Started Using the Automation Pack
Creating and Configuring HANA Targets
Step 5
Click the Authentication tab to and specify the following information to indicate whether the target
should allow authentication based on the host system:
should allow authentication based on the host system:
Default runtime user
Choose the default runtime user account that contains the
credentials to connect to the target from the drop-down
list.
credentials to connect to the target from the drop-down
list.
•
HANA.SAP Administration Unix Target—Select the
HANA OS SIDADM runtime user account.
HANA OS SIDADM runtime user account.
•
HANA.Linux Administration Unix Target—Select
the Linux user with OS administration permissions
runtime user account.
the Linux user with OS administration permissions
runtime user account.
To view the properties for the selected runtime user, click
the Properties
the Properties
tool.
To create a new runtime user account, click New >
[Runtime User Type] to create a new Runtime User
account. See
[Runtime User Type] to create a new Runtime User
account. See
Enable code injection prevention
Check this check box to enable the protection which
prevents code that is injected to exploit the security
vulnerability.
prevents code that is injected to exploit the security
vulnerability.
Maximum allowed concurrent sessions
Enter the maximum allowed open sessions to run
concurrently (default value is 3).
concurrently (default value is 3).
If the user tries to open new session via Open Session
activity, it will wait in a queue until there is a session
available to open.
activity, it will wait in a queue until there is a session
available to open.
Field
Description
Use host-based authentication
Check this check box to indicate that host-based
authentication will be used with this target.
authentication will be used with this target.
If this check box is unchecked, then host-based
authentication will not be used.
authentication will not be used.
Use the default host keys
This check box becomes enabled after the Use
host-based authentication check box is checked.
host-based authentication check box is checked.
Check this check box to indicate the host keys defined
on the Terminal Adapter property page will be used for
this target.
on the Terminal Adapter property page will be used for
this target.
If this check box is unchecked, then the user will need
to load the appropriate private key to be used to
validate this target.
to load the appropriate private key to be used to
validate this target.
Private key
This box becomes enabled only if the Use the default
host keys check box is unchecked.
host keys check box is unchecked.
To the right of the display-only field, click the Browse
tool to launch the Load Private Key dialog box and
select a private key.
Field
Description