The following OS or versions are supported as a target of remote connections. If the OS of the target is Windows, SMB and RPC are used to connect to the target. Otherwise, SSH is used to connect to the target. When using Terminal Connect Plug-in to connect to the target, Telnet or SSH is used. SSH protocol version 2 is supported.
- Windows
- Windows Server 2016 Standard
- Windows Server 2016 Datacenter
- Windows Server 2019 Standard
- Windows Server 2019 Datacenter
- Windows Server 2022 Standard
- Windows Server 2022 Datacenter
- The following SMB versions are used for connections from Ops Center Automator to a Windows connection target host.
Ops Center Automator OS Connection target host OS SMB version Encrypted communication Windows Windows v1, v2, v3 Supported1 Linux Windows v1, v2 Not supported2 - If SMB version v2 or v3 is enabled and the "Encrypt data access" setting is enabled on the Ops Center Automator and connection target host, the communication is encrypted. The available cryptographic algorithms depend on the Ops Center Automator and connection target host to use.
- The "Encrypt data access" setting must be disabled on the connection target host. If you test the connection in the Add/Edit Agentless Remote Connection window with the setting enabled on the connection target host, the KNAE02137-E message appears.
- Linux
- Red Hat Enterprise Linux versions 8.10, 9.4
- Oracle Linux versions 8.10, 9.4
The commands (other than the commands specified in the OS of the operation-target device) run by custom plug-ins, General Command Plug-in, and File-Transfer Plug-in when the OS is Linux are shown below. Before you use these plug-ins, make sure that these commands have already been installed.
- Custom plug-in
/bin/bash, /usr/bin/id, /bin/echo, /usr/bin/find, /usr/bin/test, /bin/mkdir, /bin/chmod, /bin/gunzip, /bin/tar, /bin/rm, /bin/cp, /bin/uname, /bin/su
- General Command Plug-in
/bin/bash, /usr/bin/id, /bin/echo, /usr/bin/test, /bin/uname, /bin/su
- File-Transfer Plug-in (Send: If the value of the plug-in property transferMode is "send")
/bin/bash, /usr/bin/id, /usr/bin/test, /bin/mkdir, /bin/chmod, /bin/gunzip, /bin/tar, /bin/rm, /bin/cp, /bin/uname, /bin/su
- File-Transfer Plug-in (Receive: If the value of the plug-in property transferMode is "receive")
/bin/bash, /usr/bin/id, /usr/bin/test, /bin/mkdir, /bin/chmod, /usr/bin/zip, /bin/rm, /bin/uname, /bin/su
The custom plug-in and File-Transfer Plug-in transfer files to the operation-target device using SCP or SFTP. Make sure that the operation-target device has an environment in which files can be transferred using SCP or SFTP. Note that if the operation-target device is Linux and a character string is output from .bashrc of the connecting user, transferring files using SCP might fail. Also, when connecting to the remote machine using SSH or telnet, do not include commands such as stty, tty, tset, and scripts that require an interactive environment in the login script of the connecting user. If so, change the login script or create a new user who uses the login script that does not run these commands.