ExtraHop 8.8 ExtraHop Trace Admin UI Guide
36
This option grants remote users full write access to the ExtraHop system. In addition, you can
grant additional access for packet downloads, SSL session keys, and detections.
•
Remote users have full read-only access
This option grants remote users read-only access to the ExtraHop system. In addition, you can
grant additional access for packet downloads, SSL session keys, and detections.
9. (Optional) Configure packet and session key access. Select one of the following options to allow
remote users to download packet captures and SSL session keys.
•
No access
•
Packets only
•
Packets and session keys
10. (Optional) Configure detections access. Select one of the following options to allow remote users
to view detections. This setting is visible only when the global privilege policy for detections access
control is set to
Only specified users can view detections
.
•
No access
•
Full access
11. Click
Save and Finish
.
12. Click
Done
.
Configure the server
In addition to configuring remote authentication on your ExtraHop system, you must configure your
server with two attributes, one for the ExtraHop service and one for the permission level. If you
have a Trace appliance, you can optionally add a third attribute for packet capture and session key logging.
1. Log in to your server and navigate to the shell profile for your ExtraHop configuration.
2. For the first attribute, add
service
.
3. For the first value, add
extrahop
.
4. For the second attribute, add the privilege level, such as
readwrite
.
5. For the second value, add
1
.
For example, the following figure shows the
extrahop
attribute and a privilege level of
readwrite
.
Содержание Trace Admin UI
Страница 1: ...ExtraHop 8 8 ExtraHop Trace Admin UI Guide...