During discovery, the BMC Atrium Discovery system attempts to access host systems to obtain details of processes running. Credentials including IDs and passwords, and credential-like entities (Windows proxies and SNMP credentials) for different access methods, can be stored on the system to allow the required level of access. You can set up the following:

  • The login credentials (user IDs and passwords) for interactive log-in to different host systems.
  • The Windows proxies used to discover Windows systems.
  • The SNMP credentials used on particular host systems.
    SNMP queries are only tried if an attempted login fails and if the SNMP port (UDP 161) is open on the target host.
  • The vSphere credentials used to discover VMware ESX and ESXi hosts.
  • The vCenter credentials used to discover VMware ESX and ESXi hosts by querying the vCenter server.
  • You can also run and view the progress of Device Credential Tests.
  • Databases used to query databases.
  • Middleware used to query middleware such as web and application servers.
  • Management Systems used to query management systems such as VMware Virtual Center.

About credential storage

BMC Atrium Discovery stores all passwords in a secure credential vault. Secure credential vaults are generated using public and private key pair when the appliance is commissioned. The contents of the vault is encrypted, and can be secured using a passphrase.

User accounts on the target system

When creating a user account (the account that BMC Atrium Discovery logs into to discover a host) on a target host, you should ensure that the full path to the shell is entered in the user's profile. If you do not do this, the credentials will be considered invalid.
For example: SHELL=/bin/sh

Shell support

BMC Atrium Discovery is tested to work with Bourne and Bourne-compatible shells. Support for other shells such as the Korn shell is best effort only. The product has been sporadically tested and may work but with known issues and we may not fix bugs that affect these shells.

Was this page helpful? Yes No Submitting... Thank you


  1. Blaine Simpson

    Korn is generally backwards-compatible with Bourne. According to UNIX Unleashed, System Administrator's Edition, Korn "is almost perfectly compatible with the Bourne shell; with a few minor exceptions, any shell script written to be executed by the Bourne shell can be executed correctly by the Korn shell."

    Feb 19, 2012 07:08