Submit a ticketCall us

Don’t fall victim to a ransomware attack
Backups are helpful, but sometimes that’s not enough to protect your business against ransomware. At our live webcast we will discuss how to protect against ransomware attacks with SolarWinds® Patch Manager and how to leverage log data to detect ransomware. Register now for our live webcast.

Home > Success Center > IP Address Manager (IPAM) > IPAM Administrator Guide > Configuring IPAM > Credentials

Credentials

Table of contents
No headers
Created by Nanette.Neal, last modified by Nanette.Neal on Jul 12, 2016

Views: 74 Votes: 0 Revisions: 1

The following sections detail how to configure the credentials needed to manage devices using IPAM. In addition, various user roles can be created to allow for the selected functionality.

Last modified
12:58, 12 Jul 2016

Tags

Classifications

Public