SSH credentials The SSH credential type manages access for Unix and Linux devices that use the Secure Shell (SSH). Note: For increased security, ServiceNow recommends the use of SSH private key credentials rather than SSH password credentials. These fields are available in the Credentials form for SSH. Field Description Name Enter a unique and descriptive name for this credential. Active Enable or disable these credentials for use. User name Enter the user name to create in the Credentials table. Avoid leading or trailing spaces in user names. A warning appears if the platform detects leading or trailing spaces in the user name. The VMware credentials must have the read-only role in vCenter. Password Enter the password. Credential ID Enter the unique key configured for external credentials in the JAR file uploaded to the MID Server for an external credential system. The Credential ID field has a limit of 40 characters.This field is only visible when the External credential store check box is selected. Tag Allow workflow creators to assign individual credentials to any activity in an Orchestration workflow or assign different credentials to each occurrence of the same activity type in an Orchestration workflow. External credential store Select this check box to use an external credential storage system. When you select this option the User name and Password fields are replaced with the Credential ID field. External credential storage is only available when the External Credential Storage plugin in activated. Note: Currently, the only supported external storage system is CyberArk. Applies to Select whether to apply these credentials to All MID servers in your network, or to one or more Specific MID servers. Specify the MID Servers that should use these credentials in the MID servers field. MID servers Select one or more MID Servers from the list of available MID Servers. The credentials configured in this record are available to the MID Servers in this list. This field is available only when you select Specific MID servers from the Applies to field. Order Enter the order (sequence) in which the platform tries this credential as it attempts to log onto devices. The smaller the number, the higher in the list this credential appears. Establish credential order when using large numbers of credentials or when security locks out users after three failed login attempts. If all the credentials have the same order number (or none), Discovery or Orchestration tries the credentials in a random order. SSH private key credentials formThese fields are available in the Credentials form for SSH private keys.UNIX and Linux credentialsDiscovery and Orchestration explore UNIX and Linux devices by using commands executed over Secure Shell (SSH), so they need SSH credentials.UNIX and Linux commands requiring root privileges for Discovery and OrchestrationThese commands require root privileges in Discovery and Orchestration.