-
Notifications
You must be signed in to change notification settings - Fork 23
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #325 from ritza-co/docs-18.14
Docs v18.14 release
- Loading branch information
Showing
23 changed files
with
159 additions
and
55 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,29 @@ | ||
--- | ||
title: "Microsoft DHCP Discovery" | ||
sidebar_position: 4.8 | ||
--- | ||
|
||
# Microsoft DHCP Discovery | ||
|
||
As of v18.14, Microsoft DHCP Discovery has been added as an additional discovery type located under **Discovery > DHCP**. | ||
|
||
Microsoft Dynamic Host Configuration Protocol (DHCP) is a service provided by the Microsoft Windows Server operating system. DHCP is a network management protocol used to dynamically assign IP addresses and other network configuration parameters (such as subnet mask, default gateway, DNS servers, etc.) to devices on a network. | ||
|
||
If you are already using Microsoft DHCP Servers in your environment, Microsoft DHCP Discovery can automatically populate records on discovered DHCP Servers, IP Addresses, and subnets, including additional DHCP details like DHCP Scope, State, Lease Duration, DNS information, and Start/End address ranges. | ||
|
||
![](/assets/images/microsoft-dhcp-discovery/microsoft-dhcp-3.png) | ||
|
||
## Discovery | ||
|
||
Microsoft DHCP Discovery uses WMI by default but WinRM is also supported and can be optionally enabled in the job configuration. (Example Below) | ||
|
||
![](/assets/images/microsoft-dhcp-discovery/microsoft-dhcp-1.png) | ||
|
||
:::note | ||
If **Discover Using WinRM** is not enabled, you must have a WDS paired with the selected Remote Collector to use WMI. | ||
::: | ||
|
||
## Miscellaneous | ||
The following miscellaneous discovery options are also available: | ||
|
||
![](/assets/images/microsoft-dhcp-discovery/microsoft-dhcp-2.png) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
54 changes: 54 additions & 0 deletions
54
docs/integration/external-integrations/delinea-secret-server-integration.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,54 @@ | ||
--- | ||
title: "Delinea Secret Server Integration" | ||
sidebar_position: 8.5 | ||
--- | ||
|
||
# Delinea Secret Server Integration | ||
|
||
Each Device42 Autodiscovery job is configured to use one (or more) sets of system credentials. If you already use Delinea Secret Server to manage passwords and other secrets or simply don't want to use Device42 for this purpose, the Device42 Delinea Secret Server integration allows Device42 to securely store and retrieve these credentials externally as your primary secret management solution. | ||
|
||
Delinea Secret Server offers useful features such as automatic password rotation, which can be configured to rotate secrets per your specific corporate policies and industry guidelines. | ||
|
||
:::info | ||
Please note that passwords retrieved from Delinea Secret Server are not viewable in Device42. | ||
::: | ||
|
||
## Configuring Delinea Secret Server | ||
|
||
### Pre-requisites | ||
|
||
For the Delinea Secret Server integration to work, you will need to create a user account in Delinea Secret Server with the **View Secret** permission. | ||
|
||
This user should also have view access to the desired folder(s) you would like Secrets retrieved from. | ||
|
||
While you can use any user account, it is _strongly recommended_ that you use a dedicated application account for Device42. Application accounts are restricted from logging into the UI and can only be used via the API. | ||
|
||
## Configuring Device42 | ||
|
||
- Select **Tools > Integrations > Delinea Secret Server** from the Device42 menu. | ||
|
||
![](/assets/images/delinea-secret-service-integration/Delinea_2.png) | ||
|
||
- Click on the **Edit** button in the bottom right corner and enter your Delinea Secret Server RESTful API information. (Example below) | ||
|
||
![](/assets/images/delinea-secret-service-integration/Delinea_3.png) | ||
|
||
- Verify connectivity by clicking the **Test Settings** button in the top right corner. | ||
|
||
![](/assets/images/delinea-secret-service-integration/Delinea_4.png) | ||
|
||
- The **Test Settings** button attempts to validate the supplied configuration settings by retrieving a token from Delinea Secret server. If a token is successfully retrieved, a message stating "Delinea Secret Server Settings Valid" should appear in the top right corner. (Example Success Response Below) | ||
|
||
![](/assets/images/delinea-secret-service-integration/Delinea_5.png) | ||
|
||
- If you run into configuration errors related to SSL errors, you may need to disable SSL Verification within the Delinea Secret Server configuration page before trying again. | ||
|
||
![](/assets/images/delinea-secret-service-integration/Delinea_6.png) | ||
|
||
## Using the Device42 Delinea Secret Server Integration for Discovery | ||
|
||
To create a new password object using Delinea Secret Server, simply select Delinea Secret Server from the Password Storage drop-down menu: | ||
|
||
![](/assets/images/delinea-secret-service-integration/Delinea_1.png) | ||
|
||
**Note:** By default, both usernames and passwords are retrieved from Delinea Secret Server by looking up the secret using either **Secret Name** or **Secret ID**, depending on which was selected in the configuration. Regardless of which option is selected, the value used to do the lookup is assumed to be stored in the **Label** field of the related Secret in Device42. If there is no value for **Label** then the value is taken from the **Username** field instead. Usernames and passwords are parsed from the Secret returned by Delinea Secret Server using the slugs "username" and "password" respectively. You may also override the default slugs used by utilizing **Password Custom fields** named **username_slug** and **password_slug**. |
55 changes: 55 additions & 0 deletions
55
docs/integration/external-integrations/hashicorp-vault-integration.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,55 @@ | ||
--- | ||
title: "HashiCorp Vault Integration" | ||
sidebar_position: 12.5 | ||
--- | ||
|
||
# HashiCorp Vault Integration | ||
|
||
Each Device42 autodiscovery job is configured to use one (or more) sets of system credentials. If you already use HashiCorp Vault to manage passwords and other secrets, or simply don't want to use Device42 for this purpose, the Device42 HashiCorp Vault integration allows Device42 to securely store and retrieve these credentials externally as your primary secret management solution. | ||
|
||
HashiCorp Vault offers useful features such as automatic password rotation, which can be configured to rotate secrets per your specific corporate policies and industry guidelines. | ||
|
||
:::info | ||
Please note that passwords retrieved from HashiCorp Vault are not viewable in Device42. | ||
::: | ||
|
||
## Configuring HashiCorp Vault | ||
|
||
### Pre-requisites | ||
|
||
- **(Required) Role ID / Secret ID:** For the HashiCorp Vault integration to work, you will need to create an AppRole in HashiCorp Vault with a policy that grants "read" to the desired Secret Paths. | ||
- AppRole authentication is done by using both "RoleID" and "SecretID" as credentials. | ||
- Details on how to create an AppRole and retrieve the RoleID and SecretID can be found [here](https://developer.hashicorp.com/vault/docs/auth/approle). | ||
- **(Required) Secret Engine Path:** You will also need to specify the path to a valid K/V Version 1 or Version 2 secret engine to retrieve secrets from. Example: secret, kv, foo, bar, etc. | ||
- **(Optional) Namespace:** If you're leveraging Multi-Tenancy with Namespaces then you will need to include the Namespace as well. Note: This is Limited to Vault Enterprise Standard or HCP Vault Clusters. | ||
|
||
|
||
## Configuring Device42 | ||
|
||
- Select **Tools > Integrations > HashiCorp Vault** from the Device42 menu. | ||
|
||
![](/assets/images/hashicorp-vault-integration/HashiCorp_2.png) | ||
|
||
- Click on the **Edit** button in the bottom right corner and enter your HashiCorp Vault RESTful API information. (Example below) | ||
|
||
![](/assets/images/hashicorp-vault-integration/HashiCorp_3.png) | ||
|
||
- Verify connectivity by clicking the **Test Settings** button in the top right corner. | ||
|
||
![](/assets/images/hashicorp-vault-integration/HashiCorp_4.png) | ||
|
||
- The **Test Settings** button attempts to validate the supplied configuration settings by retrieving a token from HashiCorp Vault. If a token is successfully retrieved, a message stating "HashiCorp Vault Settings Valid" should appear in the top right corner. (Example Success Response Below) | ||
|
||
![](/assets/images/hashicorp-vault-integration/HashiCorp_5.png) | ||
|
||
- If you run into configuration errors related to SSL errors, you may need to disable SSL Verification within the HashiCorp Vault configuration page before trying again. | ||
|
||
![](/assets/images/hashicorp-vault-integration/HashiCorp_6.png) | ||
|
||
## Using the Device42 HashiCorp Vault Integration for Discovery | ||
|
||
To create a new password object using HashiCorp Vault, simply select HashiCorp Vault from the **Password Storage** drop-down menu: | ||
|
||
![](/assets/images/hashicorp-vault-integration/HashiCorp_1.png) | ||
|
||
**Note:** By default, both usernames and passwords are retrieved from HashiCorp Vault by looking up the secret using its path within the vault. The value used to do the lookup is assumed to be stored in the **Label** field of the related Secret in Device42. If there is no value for **Label** then the value is taken from the **Username** field instead. Usernames and passwords are parsed from the Secret returned by HashiCorp Vault using the slugs "username" and "password" respectively. You may also override the default slugs used by utilizing **Password Custom fields** named **username_slug** and **password_slug**. |
Binary file added
BIN
+59.5 KB
static/assets/images/delinea-secret-service-integration/Delinea_1.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+46.2 KB
static/assets/images/delinea-secret-service-integration/Delinea_3.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+38.8 KB
static/assets/images/delinea-secret-service-integration/Delinea_4.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+32.5 KB
static/assets/images/delinea-secret-service-integration/Delinea_5.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+38.6 KB
static/assets/images/delinea-secret-service-integration/Delinea_6.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.